-
December 30th, 2001, 06:49 PM
#1
Member
Kerberos
Hello everyone. I hope most of you here are familiar with the Kerberos authentication service. Its version 5 is often claimed to be a very secure implementation on open networks. With all the key exchanges that occur between the Authorization Server, the TGS, the application server and the client station, I wanted to know its advantage over the more traditional Unix/linux and windows network. Does Unix also employ such an exchange of tickets between the client and servers, or is the network password the only relevant authenticator?
-
December 30th, 2001, 06:57 PM
#2
Actually, Kerberos was first created on Unix then ported over to Windows. I did a simplified paper on it for a course. I'd post it but JP don't like graphics. Maybe I'll send it in for the next Newsletter.
In the meantime, you might want to visit the origins of Kerberos at http://web.mit.edu/kerberos/www/
Hope this helps.
-
December 30th, 2001, 07:04 PM
#3
Member
Thanx., MsMittens but actually what I wanted to know was how Unix implements its authentication? Do all servers like the file-server, print server etc, maintain access control lists to compare against the user password?
Also, would it be possible to have a look at ur course paper, if u still have it? Thanks again
-
December 30th, 2001, 07:29 PM
#4
Member
Just getting this back to the top.... And hoping that somebody answers me!!!
-
December 30th, 2001, 10:21 PM
#5
Member
Just getting this back to the top.. COMEON!!! THis is getting ludicrous!! I need to know this for a course project presentation!!!
So ...P-L-E-A-S-E answer!
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|