From K5Wiki
Jump to: navigation, search

This page is a guideline for best practices in the MIT Kerberos development process. This is not a policy that must be followed. However the community has found that following the guidelines expressed here is desirable and leads to an improved chance of a good outcome.