Kerberos has long been considered to reside at the top of the network authentication protocol tree as the most secure and, unfortunately, most complex authentication system. This comes not from the way in which Kerberos is designed, but rather from the complexity of the systems that have grown up around Kerberos that support identity management, especially when applied across organizational boundaries. Using the F5 BIG-IP Local Traffic Manager to support federation of cross-domain service access in a PKI-enabled architecture. Running time: 16:20 Read full white paper here.
And click here for more F5 Audio.
Technorati Tags: F5, infrastructure 2.0, integration, cloud connect, Pete Silva, security, business, education, technology, application delivery, intercloud, cloud, context-aware, infrastructure 2.0, automation, web, internet