User-based Access
The user-based access methods work by authorizing specific users to connect to the server. When a client establishes a connection to a server, it has to prove being controlled by an authorized user.
The two methods based on authenticating users are SUN-DES-1
and MIT-KERBEROS-5
. The first system is based on a mechanism of secure remote procedure call developed in SunOS. The second mechanism is based on both client and server trusting a Kerberos server.
Read more about this topic: X Window Authorization
Famous quotes containing the word access:
“Knowledge in the form of an informational commodity indispensable to productive power is already, and will continue to be, a majorperhaps the majorstake in the worldwide competition for power. It is conceivable that the nation-states will one day fight for control of information, just as they battled in the past for control over territory, and afterwards for control over access to and exploitation of raw materials and cheap labor.”
—Jean François Lyotard (b. 1924)