User-based Access
The user-based access methods work by authorizing specific users to connect to the server. When a client establishes a connection to a server, it has to prove being controlled by an authorized user.
The two methods based on authenticating users are SUN-DES-1
and MIT-KERBEROS-5
. The first system is based on a mechanism of secure remote procedure call developed in SunOS. The second mechanism is based on both client and server trusting a Kerberos server.
Read more about this topic: X Window Authorization
Famous quotes containing the word access:
“The last publicized center of American writing was Manhattan. Its writers became known as the New York Intellectuals. With important connections to publishing, and universities, with access to the major book reviews, they were able to pose as the vanguard of American culture when they were so obsessed with the two JoesMcCarthy and Stalinthat they were to produce only two artists, Saul Bellow and Philip Roth, who left town.”
—Ishmael Reed (b. 1938)