Question:
(a) Explain what is meant by the term Single sign-on in the context of access control? Give three examples of single sign-on technologies.
(b) Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation.
(c) Explain the authentication process in a synchronous token system?