2 |
Authentication and security
-
Server-based user authentication, secret key based, strength better than UNIX but still not in Kerberos league
-
Support for a variety of repositories: LDAP, RDBMS, local encrypted files, HTTP-based files
-
Licensing (eliminates rogue servers )
-
Secure Sockets used for server-client communication
|