OSF DCE Application Development Guide--Core Components
Authentication
Core Services for more detailed information on how security clients and the
Authentication Service determine which protocol to use.)
For a general discussion of the security aspects of these protocols, and of security
administration and security ERAs, see the chapter entitled "Creating and Maintaining
Principals, Groups, and Organizations" in the OSF DCE Administration Guide — Core
Services. This section explains how the three protocols operate.
23.2.1.1.1 The Third-Party Authentication Protocol
This section describes how the DCE Authentication Service uses the third-party
authentication protocol to provide a user with a Ticket-Granting Ticket. Refer to Figure
23-2 as you read the following steps.
124245 Tandem Computers Incorporated 23−7