Examples of using Kerberos authentication in English and their translations into Russian
{-}
-
Official
-
Colloquial
SMB may use Kerberos authentication.
These trusts use Kerberos authentication.
The Kerberos authentication protocol includes some countermeasures.
Your CommuniGate Pro Account has the Kerberos Authentication method enabled.
Kerberos authentication, using service principal names(SPNs).
The CommuniGate Pro Server supports the Kerberos authentication method.
NFS may use Kerberos authentication and a client cache.
By default, AD RMS does not support Kerberos authentication.
Because Kerberos authentication is used, the user accounts and security groups must exist in an Active Directory domain.
Advanced Encryption Services(AES 128 and 256) support for the Kerberos authentication protocol.
The Federation Service account uses Kerberos authentication or NTLM encryption to protect this communication.
If this option is enabled,the user can log into the Account using the Kerberos Authentication method.
If Kerberos authentication(remote authentication) has been enabled, a separate login screen appears when the Scan to FTP feature is selected.
Simo Sorce of Red Hat discovered that the Samba client code always requests a forwardable ticket when using Kerberos authentication.
As a best practice, do not disable this setting if you use Kerberos authentication and have a custom identity on the application pool.
It is not, however, intended to replace strong authentication protocols,such as public-key or Kerberos authentication.
The Windows Time service is essential to the successful operation of Kerberos authentication and, therefore, to Active Directory- based authentication. .
To support Kerberos Authentication, you need to add Kerberos Server key(s) to the CommuniGate Pro Server, on the per-domain basis.
For information about steps that you must take to configure the server to support Kerberos authentication, see Enable support for Kerberos authentication.
Constrained delegation, which makes it possible for applications to take advantage of the secure delegation of user credentials by means of the Kerberos authentication protocol.
The Debian Edu school server provides an LDAP database and Kerberos authentication service, centralized home directories, a DHCP server, a web proxy and many other services.
Constrained delegation is included, which makes it possible for applications to take advantage of the secure delegation of user credentials by means of the Kerberos authentication protocol.
The provided school server provides an LDAP database and Kerberos authentication service, centralized home directories, a DHCP server, a web proxy and many other services.
Outlook 2003 received improved functionality in many areas, including better email and calendar sharing and information display, complete Unicode support, search folders,colored flags, Kerberos authentication, RPC over HTTP, and Cached Exchange mode.
IPsec is fully integrated, allowing connections to be allowed or denied based on security certificates, Kerberos authentication, etc. Encryption can also be required for any kind of connection.
When required to run the task, the Task Scheduler service will use the“Service-for-User”(S4U)extensions to the Kerberos authentication protocol to retrieve the user's token.
Additional features are part of a licensable option called the advanced security option:FIPS encryption, Kerberos authentication, LDAP authentication, and Database column encryption.
AD FS provides an extensible architecture that supports theSecurity Assertion Markup Language(SAML) 1.1 token type and Kerberos authentication(in the Federated Web SSO with Forest Trust design).
Nextcloud is introducing new features such as monitoring capabilities,full-text search and Kerberos authentication, as well as audio/video conferencing, expanded federation and smaller UI improvements.