xref: /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/Kerberos.htm (revision 7f2fe78b9dd5f51c821d771b63d2e096f6fd49e9)
1*7f2fe78bSCy Schubert<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
2*7f2fe78bSCy Schubert<html><head>
3*7f2fe78bSCy Schubert<meta name="GENERATOR" content="Microsoft� HTML Help Workshop 4.1">
4*7f2fe78bSCy Schubert<link rel="stylesheet" type="text/css" href="Leash.css">
5*7f2fe78bSCy Schubert
6*7f2fe78bSCy Schubert<title>What is Kerberos?</title></head>
7*7f2fe78bSCy Schubert
8*7f2fe78bSCy Schubert<body>
9*7f2fe78bSCy Schubert
10*7f2fe78bSCy Schubert<h1> Kerberos </h1>
11*7f2fe78bSCy Schubert<h2>What is Kerberos? </h2>
12*7f2fe78bSCy Schubert<p>
13*7f2fe78bSCy SchubertKerberos is a network authentication protocol that allows users to
14*7f2fe78bSCy Schubertsecurely access services over a physically insecure network. Kerberos,
15*7f2fe78bSCy Schubertor MIT Kerberos, is also the name of this application. MIT Kerberos
16*7f2fe78bSCy Schubertprovides an easy interface to the Kerberos protocol.</p>
17*7f2fe78bSCy Schubert
18*7f2fe78bSCy Schubert<p>
19*7f2fe78bSCy SchubertIn addition to providing secure access to services, Kerberos adds
20*7f2fe78bSCy Schubertconvenience by allowing you to sign on just once to use many network
21*7f2fe78bSCy Schubertresources such as servers, hosts, or other services.</p>
22*7f2fe78bSCy Schubert<p>
23*7f2fe78bSCy SchubertKerberos gives you this convenience and security through the use of
24*7f2fe78bSCy Schubertsingle sign on, mutual authentication, and secret key encryption. </p>
25*7f2fe78bSCy Schubert
26*7f2fe78bSCy Schubert<p>
27*7f2fe78bSCy Schubert<table>
28*7f2fe78bSCy Schubert<tbody><tr>
29*7f2fe78bSCy Schubert<th>Single Sign On </th>
30*7f2fe78bSCy Schubert</tr>
31*7f2fe78bSCy Schubert<tr>
32*7f2fe78bSCy Schubert<td>  Your Kerberos identity (your <em><a href="JavaScript:popup.TextPopup(popupPrincipal, popfont,9,9,-1,-1)">principal</a></em>)
33*7f2fe78bSCy Schubertand your password allow you to log on just once to access all of the
34*7f2fe78bSCy Schubertservers, hosts, and other resources that use the Kerberos installation.
35*7f2fe78bSCy SchubertNo matter how many resources you use, you will not need to enter your
36*7f2fe78bSCy Schubertpassword again. </td>
37*7f2fe78bSCy Schubert</tr>
38*7f2fe78bSCy Schubert<tr>
39*7f2fe78bSCy Schubert<th>Mutual Authentication </th>
40*7f2fe78bSCy Schubert</tr>
41*7f2fe78bSCy Schubert<tr>
42*7f2fe78bSCy Schubert<td> Authentication is proof of identity. Any protocol or service that
43*7f2fe78bSCy Schubertdemands a password is authenticating the user. However, Kerberos
44*7f2fe78bSCy Schubertprovides <i>mutual</i> authentication, so in addition to proving your
45*7f2fe78bSCy Schubertidentity to the server, it proves that the server you are communicating
46*7f2fe78bSCy Schubertwith is what it claims to be. This protects you against <a href="JavaScript:popup.TextPopup(popupPhishing, popfont,9,9,-1,-1)"> phishing </a> and <a href="JavaScript:popup.TextPopup(popupSpoofing, popfont,9,9,-1,-1)"> spoofing. </a></td>
47*7f2fe78bSCy Schubert</tr>
48*7f2fe78bSCy Schubert<tr>
49*7f2fe78bSCy Schubert<th>Secret-Key Encryption </th>
50*7f2fe78bSCy Schubert</tr>
51*7f2fe78bSCy Schubert<tr>
52*7f2fe78bSCy Schubert<td>
53*7f2fe78bSCy SchubertKerberos prevents malicious attempts to intercept your password by
54*7f2fe78bSCy Schubertencrypting your password before transmitting it. In addition, once you
55*7f2fe78bSCy Schubertand the server have proved your identities to each other, Kerberos uses
56*7f2fe78bSCy Schubertsecret-key cryptography to secure the rest of your communications. This
57*7f2fe78bSCy Schuberthelps maintain your privacy and the integrity of your data.</td>
58*7f2fe78bSCy Schubert</tr>
59*7f2fe78bSCy Schubert </tbody></table>
60*7f2fe78bSCy Schubert</p><h2>Related Help</h2>
61*7f2fe78bSCy Schubert<ul id="helpul">
62*7f2fe78bSCy Schubert<li><a href="HTML/Kerberos_Terminology.htm">Kerberos terminology</a></li>
63*7f2fe78bSCy Schubert<li><a href="HTML/Encryption_Types.htm">Encryption types</a></li>
64*7f2fe78bSCy Schubert<li><a href="HTML/How_Kerberos_Works.htm">How does Kerberos work?</a></li>
65*7f2fe78bSCy Schubert</ul>
66*7f2fe78bSCy Schubert
67*7f2fe78bSCy Schubert<script language="JavaScript">
68*7f2fe78bSCy Schubertpopfont="Arial,.725,"
69*7f2fe78bSCy SchubertpopupPhishing="A type of email scam. The scammer sends an email that appears  to come from a legitimate company asking you to log on to the company website using the included link. The link takes you instead to a fake website modeled after that of the real company. If you try to log on, the fake website harvests your username and password for later malicious use."
70*7f2fe78bSCy SchubertpopupSpoofing="To 'spoof' means to fake. Hackers can spoof email (making you think the email came from a trusted source), websites (making you think a website is legitimate), and IP addresses. IP spoofing can be used to hijack your browser and take you to fradulent web page that looks legitimate and can be used harvest your username and password."
71*7f2fe78bSCy SchubertpopupPrincipal="Your principal is your Kerberos identity. It is your user name combined with the Kerberos realm you are using. For example: 'jdoe@SALES.WIDGET.COM' "
72*7f2fe78bSCy Schubert</script>
73*7f2fe78bSCy Schubert
74*7f2fe78bSCy Schubert<object id="popup" type="application/x-oleobject" classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11">
75*7f2fe78bSCy Schubert</object>
76*7f2fe78bSCy Schubert</body></html>
77