Four Stages to Using the GSSAPI
The application acquires a set of credentials
A pair of communicating applications establish a joint security context using their credentials
Per-message services are invoked to apply either:
- integrity and data origin authentication, or
- confidentiality, integrity and data origin authentication
At the completion of a communication session the peer application delete the security context