There are several reasons for this, including:

  • It ensures that logging and auditing timestamps are accurate.
  • It is useful when correlating events across multiple systems.
  • It is essential to ensure correct behavior if replication conflicts arise.
  • It is necessary for time-sensitive authentication mechanisms like GSSAPI and UNBOUNDID-TOTP.
  • It is important for time-related password policy processing.