OSF DCE Application Development Guide--Core Components

DCE Host Services
greater security risk because data is sent over the network. For remote access, these
routines actually get all the keys during one remote procedure call to be more efficient
and to minimize the time keys are being sent over the network.
Earlier in this section we described how to change the key of a key table with the
dced_keytab_change_key( ) routine. The key table management service also provides
the routines dced_keytab_add_key( ) and dced_keytab_remove_key( ) to control key
modification in even greater detail.
Finally, you can create a new key table by using dced_keytab_create(), or you can
delete an existing key table by using dced_keytab_delete( ).
124245 Tandem Computers Incorporated 2 27