In addition to the authentication methods described in Chapter
3, you can use Kerberos, the network authentication protocol from the
Massachusetts Institute of Technology. This chapter describes how to set up
and use Kerberos on SSH. Before you can use Kerberos authentication, you must
set up Kerberos on OpenVMS, as described in the OpenVMS HP
Open Source Security for OpenVMS Volume 3: Kerberos manual.
NOTE: This version of SSH for OpenVMS supports Kerberos for OpenVMS Version
V2.1 and higher.
This chapter describes how to set up Kerberos authentication, including
the following topics: