영어에서 Kerberos authentication 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Kerberos authentication protocol support.
Host name for kerberos authentication.
A Kerberos authentication ticket(TGT) was requested.
Service that uses Kerberos authentication.
When Kerberos authentication is required.
This policy is compatible with Kerberos authentication.
Kerberos authentication can be difficult to set up and manage.
In this environment, you are required to use Kerberos authentication.
Required for Kerberos authentication support.
The following steps summarize configuring Kerberos authentication.
While using Kerberos authentication, SSPI works the same way as GSSAPI.
This policy is designed to work with a Kerberos authentication backend.
This occurs because Kerberos authentication fails for\\domain\sysvol,\\domain\netlogon, and other DFS paths.
Configure WSS to will require Kerberos authentication.
For Kerberos authentication, the resource/authentication server may have provided a TGT and an associated session key in step 3052.
If you choose Negotiate(Kerberos), Kerberos authentication is attempted first.
The Kerberos authentication service uses an SPN to authenticate a service.
Error occurred while using Kerberos authentication: Cannot find the computer.
Create SPNs for web applications that will use Kerberos authentication.
For Kerberos authentication, the verification may fail if the timestamp is outside the tolerance threshold set by the client device 2805.
Create the web applications that will use Kerberos authentication.
In Kerberos authentication, the resource/authentication server may also send a ticket, such as a TGT or a service ticket, to the proxy device 2810.
In this environment, you are required to use Kerberos authentication.
If you use Kerberos authentication for Web Services, you must reassign Kerberos accounts and reset the password after the In-Place Upgrade is complete.
Administrators and users should know how to make sure that they are using Kerberos authentication for remote connections.
Additionally, when you use Windows and Kerberos authentication in your environment, you might need to register a Service Principle Name(SPN) with the domain controller(DC).
The maximum amount of time that the internal system clocks on all hosts that are participating in the Kerberos authentication system can differ.
The Kerberos authentication client is implemented as a security support provider(SSP), and it can be accessed through the Security Support Provider Interface(SSPI).
Some capabilities like offline snapshots, background refresh, and Kerberos authentication will come after this initial release.
For example, if Kerberos authentication is used, the context information may identify Kerberos generally or PKINIT/Kerberos if the PKINIT features of Kerberos are being used.