How does Kerberos compare to CAS? They seem somewhat similar from a high level view. I am specifically interested in a technology that will allow logins to a computer (through PAM) to carry over to a firefox browser. It seems that both allow this. Is the a place the does comparisons between the two technologies? Thanks.