You’ve got a smooth running Windows network. Now some exec decides that a Unix/Linux application has to be brought in as a business-critical platform. Not that they know it’s a Unix/Linux app, just ...
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s, as part of a project called Athena. The project involved integrating the computers on the MIT ...