Next: , Previous: How Kerberos Works, Up: Top



3 Configuration Files