User-based Access
The user-based access methods work by authorizing specific users to connect to the server. When a client establishes a connection to a server, it has to prove being controlled by an authorized user.
The two methods based on authenticating users are SUN-DES-1
and MIT-KERBEROS-5
. The first system is based on a mechanism of secure remote procedure call developed in SunOS. The second mechanism is based on both client and server trusting a Kerberos server.
Read more about this topic: X Window Authorization
Famous quotes containing the word access:
“The nature of womens oppression is unique: women are oppressed as women, regardless of class or race; some women have access to significant wealth, but that wealth does not signify power; women are to be found everywhere, but own or control no appreciable territory; women live with those who oppress them, sleep with them, have their childrenwe are tangled, hopelessly it seems, in the gut of the machinery and way of life which is ruinous to us.”
—Andrea Dworkin (b. 1946)