The kerberos process begins when a user or application attempts to log in to an environment using an application or a ____ using the kerberos protocol.