Friday, June 25, 2010

Audio Tech Brief - Constrained Delegation in CAC PKI Architectures

Kerberos has long been considered to reside at the top of the network authentication protocol tree as the most secure and, unfortunately, most complex authentication system. This comes not from the way in which Kerberos is designed, but rather from the complexity of the systems that have grown up around Kerberos that support identity management, especially when applied across organizational boundaries.  Using the F5 BIG-IP Local Traffic Manager to support federation of cross-domain service access in a PKI-enabled architecture.  Running time: 16:20   Read full white paper here.

And click here for more F5 Audio.

ps

twitter: @psilvas

Technorati Tags: F5, infrastructure 2.0, integration, cloud connect, Pete Silva, security, business, education, technology, application delivery, intercloud, cloud, context-aware, infrastructure 2.0, automation, web, internet

Posted via email from psilva's prophecies

No comments:

Post a Comment