User-based Access
The user-based access methods work by authorizing specific users to connect to the server. When a client establishes a connection to a server, it has to prove being controlled by an authorized user.
The two methods based on authenticating users are SUN-DES-1
and MIT-KERBEROS-5
. The first system is based on a mechanism of secure remote procedure call developed in SunOS. The second mechanism is based on both client and server trusting a Kerberos server.
Read more about this topic: X Window Authorization
Famous quotes containing the word access:
“A girl must allow others to share the responsibility for care, thus enabling others to care for her. She must learn how to care in ways appropriate to her age, her desires, and her needs; she then acts with authenticity. She must be allowed the freedom not to care; she then has access to a wide range of feelings and is able to care more fully.”
—Jeanne Elium (20th century)