{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Kerberos Overview Cisco

Kerberos Overview Cisco - Kerberos Overview An...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Kerberos Overview- An Authentication Service for Open Network Systems Document ID: 16087 Introduction Kerberos Authors Introduction to Kerberos Kerberos Concepts Motivation Behind Kerberos What is Kerberos? What Does Kerberos Do? Kerberos Software Components Kerberos Names How Kerberos Works Kerberos Credentials Get the Initial Kerberos Ticket Request a Kerberos Service Get Kerberos Server Tickets The Kerberos Database The KDBM Server The kadmin and kpasswd Programs Kerberos Database Replication Kerberos From the Outside Looking In Kerberos User's Eye View Kerberos From the Programmer's Viewpoint The Kerberos Administrator's Job The Bigger Kerberos Picture Other Network Services' Use of Kerberos Interaction with Other Kerberi Kerberos Issues and Open Problems Kerberos Status Kerberos Acknowledgments Appendix: Kerberos Application to SUN's Network File System (NFS) Kerberos Unmodified NFS Kerberos Modified NFS Kerberos Security Implications of the Modified NFS Kerberos References NetPro Discussion Forums - Featured Conversations Related Information Introduction In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users' identities. This paper gives an overview of the Kerberos authentication model as implemented for MIT's Project Athena. It describes the protocols used by clients, servers, and Kerberos to achieve authentication. It also describes the management and replication of the database required. The views of Kerberos as seen by the user, programmer, and administrator are described. Finally, the role of Kerberos in the larger Athena picture is given, along with a list of applications that presently use Kerberos for user authentication. We describe the addition of Kerberos authentication to the Sun Network File System as a case
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
study for integrating Kerberos with an existing application. Kerberos Authors Jennifer G. Steiner, Project Athena, Massachusetts Institute of Technology, Cambridge, MA 02139, [email protected] Clifford Neuman, Department of Computer Science, FR-35, University of Washington, Seattle, WA 98195, [email protected] Clifford Neuman was a member of the Project Athena staff during the design and initial implementation phase of Kerberos. Jeffrey I. Schiller, Project Athena, Massachusetts Institute of Technology, Cambridge, MA 02139, [email protected] Introduction to Kerberos This paper gives an overview of Kerberos, an authentication system designed by Miller and Neuman. for open network computing environments, and describes our experience using it at MIT's Project Athena. In the section on Motivation, we explain why a new authentication model is needed for open networks, and what its requirements are. The What is Kerberos? section lists the components of the Kerberos software and describes how they interact in providing the authentication service. In the Kerberos Names section, we describe the
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern