2.1.2.3 Enterprise Environment

The protocols commonly used in enterprise environments for authentication and secure transport of application data are listed in section 2.2.1. The following section describes how distributed applications use the Authentication Services protocols in the enterprise environment, with the file access services as an example.