1.5 Prerequisites/Preconditions

Because SPNEGO relies on other security protocols that perform authentication, those protocols have to be available to SPNEGO for it to operate. The set of protocols is implementation-dependent upon the installation.<3>

Applications typically establish a connection before they invoke SPNEGO, although establishing a connection before invoking SPNEGO is not required by the SPNEGO protocol.