Data security with Kerberos is listed as the the following process
- An authentication protocol
- Tickets to authenticate
- Avoid locally storing passwords or sending them over the internet
- A trusted third-party validation
- Symmetric-key cryptography
Kerberos realm is based on policy management definitions; it encompasses all that is available to access such as clients, services, hosts, and a Key Distribution Center (KDC) (Authentication Server and the Ticket Granting Server (TGS)). Proof of identity is user/password credentials encrypted with a secret key for the particular service requested, and single sign-on (SSO) authenticates ticket created with a new login or with a cache on the system.
Accessing request to a service or host happens through the following interactions:
- The authentication server
- The ticket granting server
- The service or host machine needed to access
- KDC stores all of the secret keys for user machines and services in its database
- The...