Kerberos token capabilities for encryption, decryption, signing, and verifying
You can use Kerberos tokens for encryption, decryption, signing, and verifying.
- Encrypt, by using a Kerberos Key Distribution Center (KDC)
- Decrypt, by using the Kerberos keytab file
Policy Enforcement Point (PEP) and direction
- In (provider)
- In (consumer)
Configured with a policy set and binding defining the message Integrity
Trust Store or Policy Decision Point (PDP)
- Kerberos KDC.