0% found this document useful (0 votes)
18 views1 page

Application Kerb

Kerberos is primarily used for user authentication, allowing users to log in once and access multiple network resources through Single Sign-On (SSO). It employs mutual authentication to ensure both client and server are verified before data transfer, using shared secret keys. Additionally, Kerberos provides a system for authorization, enabling users to access only the resources they are permitted to use based on service tickets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views1 page

Application Kerb

Kerberos is primarily used for user authentication, allowing users to log in once and access multiple network resources through Single Sign-On (SSO). It employs mutual authentication to ensure both client and server are verified before data transfer, using shared secret keys. Additionally, Kerberos provides a system for authorization, enabling users to access only the resources they are permitted to use based on service tickets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Applications of Kerberos

User Authentication: User Authentication is one of the main applications of


Kerberos. Users only have to input their username and password once with Kerberos
to gain access to the network. The Kerberos server subsequently receives the
encrypted authentication data and issues a ticket granting ticket (TGT).
Single Sign-On (SSO): Kerberos offers a Single Sign-On (SSO) solution that
enables users to log in once to access a variety of network resources. A user can
access any network resource they have been authorized to use after being
authenticated by the Kerberos server without having to provide their credentials
again.
Mutual Authentication: Before any data is transferred, Kerberos uses a mutual
authentication technique to make sure that both the client and server are
authenticated. Using a shared secret key that is securely kept on both the client
and server, this is accomplished. A client asks the Kerberos server for a service
ticket whenever it tries to access a network resource. The client must use its
shared secret key to decrypt the challenge that the Kerberos server sends via
encryption. If the decryption is successful, the client responds to the server with
evidence of its identity.
Authorization: Kerberos also offers a system for authorization in addition to
authentication. After being authenticated, a user can submit service tickets for
certain network resources. Users can access just the resources they have been given
permission to use thanks to information about their privileges and permissions
contained in the service tickets.

You might also like