Kerberos Initial Authentication Methods
This document discusses the various methods that have been used for initial authentication in Kerberos, using passwords and various other forms of key material, as well as various methods that may offer significant benefits which may justify the effort of specifying and implementing them, as well as the advantages and disadvantages of the various approaches relative to each other.