Understanding the Kerberos Architecture