I'm trying to find information about how the Enhanced Authentication Plugin really works.
I know how to use it and how to install it, what i want to know is what happens under the shell:
- What version/release of Kerberos is being used?
- What protocols and ports are being used in the client/network/server?
- What algorithms are used for encryption?
- How is the plugin protected from tampering/exploitation?
It's not asking much of VMware to provide this information, but the information provided is limited to superficial sales-pitches and endless rows of "install howto's".
Am i missing the "elephant graveyard" where VMware White Papers go to meet a quiet death, or is it provided in a "special, paying members, invite only"-area?