Authentication and Access
Control
n Authentication
n Username/password sent encrypted from
client to server over RMI when connection
established
n Server handles Kerberos authentication
n Access Control
n Access control currently “all or nothing”
n Additional mechanisms to be based on IP
requirements