The Kerberos network authentication protocol enables client/server applications to identify one another in a secure manner, even when communicating over an unsecured network.
In Kerberos terminology, individual applications are called principals. Each principal has a keytab file, which contains its key, or password. When one principal wants to communicate with another, it presents its keytab file for authentication and is only granted access to the other principal if its name and key are recognized. Because keytab files are protected using strong encryption, this process still works over unsecured networks.
To enable Kerberos:
You also need to manually configure Kerberos for the Transform Service after installing BDD. For instructions, see Enabling Kerberos for the Transform Service.