Within enterprises we’re often dealing with a mix of login mechanisms like Kerberos, LDAP and OAuth/OpenID. Occasionally, systems employ all three for securing their various surfaces. How do these fit, work and sometimes overlap within an organization’s IT estate? Kerberos Applications running within (unsecure) networks can use Kerberos for authentication…