Installing, Configuring and Administering the Kerberos Server V 2.0 on HP-UX 11i
Interoperability With Windows 2000
Understanding the Terminology
Chapter 4 53
In broad strokes, that is how the Kerberos authentication protocol works
and both implementations under discussion have virtually identical
conceptual frameworks. Of course there are mechanical differences -for
example, the HP’s implementation uses configuration files to locate host
systems and the Microsoft implementation uses strictly DNS lookup to
resolve host names. But both implementations are written to RFC 1510
and RFC 1964, and hence interoperate.
The next section, “Table of Analogous Terms” on page 54 lists the
difference in the terminologies used.