Slide 51 of 58
Notes:
Many sites have come the conclusion that a marriage of technologies like Kerberos, X.509, SSL and LDAP offer the best solution to an integrated security infrastructure. These examples demonstrate a number of real world implementations as to how this can be accomplished. These solutions are contrasted and compared in an excellent paper by a group at Brown University. URL is below.
Http://www.brown.edu/Facilities/CIS/ATGTest/Infrastructure/
Web_Access_Control/GoalsOptions.html