in reply to encrypt passwords

Since we seem to be on the general subject of authentication and authorization, here’s a good introduction to how LDAP, Kerberos, and RADIUS technologies work together.   There are many others, including quite a few from Microsoft and Apple, both of whom embraced these things a long time ago.

To briefly quote three bullet-points from that article: