The kerberos protocol uses strong cryptography so that a client can prove its identity to a server and vice versa across an insecure network.
Kerberos' three heads
The client. Usually the user.
The server. Usually a programm offering a service (such as a
database etc.)
KDC: The key distribution center. This is the trusted 3rd party used to verify the authenticity of both the client and the server.