The identity of the remote computer was verified through a connection broker, which was verified by using Kerberos protocol. ...