1*7f2fe78bSCy Schubert<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN"> 2*7f2fe78bSCy Schubert<html><head> 3*7f2fe78bSCy Schubert<meta name="GENERATOR" content="Microsoft� HTML Help Workshop 4.1"> 4*7f2fe78bSCy Schubert<link rel="stylesheet" type="text/css" href="Leash.css"> 5*7f2fe78bSCy Schubert 6*7f2fe78bSCy Schubert<title>What is Kerberos?</title></head> 7*7f2fe78bSCy Schubert 8*7f2fe78bSCy Schubert<body> 9*7f2fe78bSCy Schubert 10*7f2fe78bSCy Schubert<h1> Kerberos </h1> 11*7f2fe78bSCy Schubert<h2>What is Kerberos? </h2> 12*7f2fe78bSCy Schubert<p> 13*7f2fe78bSCy SchubertKerberos is a network authentication protocol that allows users to 14*7f2fe78bSCy Schubertsecurely access services over a physically insecure network. Kerberos, 15*7f2fe78bSCy Schubertor MIT Kerberos, is also the name of this application. MIT Kerberos 16*7f2fe78bSCy Schubertprovides an easy interface to the Kerberos protocol.</p> 17*7f2fe78bSCy Schubert 18*7f2fe78bSCy Schubert<p> 19*7f2fe78bSCy SchubertIn addition to providing secure access to services, Kerberos adds 20*7f2fe78bSCy Schubertconvenience by allowing you to sign on just once to use many network 21*7f2fe78bSCy Schubertresources such as servers, hosts, or other services.</p> 22*7f2fe78bSCy Schubert<p> 23*7f2fe78bSCy SchubertKerberos gives you this convenience and security through the use of 24*7f2fe78bSCy Schubertsingle sign on, mutual authentication, and secret key encryption. </p> 25*7f2fe78bSCy Schubert 26*7f2fe78bSCy Schubert<p> 27*7f2fe78bSCy Schubert<table> 28*7f2fe78bSCy Schubert<tbody><tr> 29*7f2fe78bSCy Schubert<th>Single Sign On </th> 30*7f2fe78bSCy Schubert</tr> 31*7f2fe78bSCy Schubert<tr> 32*7f2fe78bSCy Schubert<td> Your Kerberos identity (your <em><a href="JavaScript:popup.TextPopup(popupPrincipal, popfont,9,9,-1,-1)">principal</a></em>) 33*7f2fe78bSCy Schubertand your password allow you to log on just once to access all of the 34*7f2fe78bSCy Schubertservers, hosts, and other resources that use the Kerberos installation. 35*7f2fe78bSCy SchubertNo matter how many resources you use, you will not need to enter your 36*7f2fe78bSCy Schubertpassword again. </td> 37*7f2fe78bSCy Schubert</tr> 38*7f2fe78bSCy Schubert<tr> 39*7f2fe78bSCy Schubert<th>Mutual Authentication </th> 40*7f2fe78bSCy Schubert</tr> 41*7f2fe78bSCy Schubert<tr> 42*7f2fe78bSCy Schubert<td> Authentication is proof of identity. Any protocol or service that 43*7f2fe78bSCy Schubertdemands a password is authenticating the user. However, Kerberos 44*7f2fe78bSCy Schubertprovides <i>mutual</i> authentication, so in addition to proving your 45*7f2fe78bSCy Schubertidentity to the server, it proves that the server you are communicating 46*7f2fe78bSCy Schubertwith is what it claims to be. This protects you against <a href="JavaScript:popup.TextPopup(popupPhishing, popfont,9,9,-1,-1)"> phishing </a> and <a href="JavaScript:popup.TextPopup(popupSpoofing, popfont,9,9,-1,-1)"> spoofing. </a></td> 47*7f2fe78bSCy Schubert</tr> 48*7f2fe78bSCy Schubert<tr> 49*7f2fe78bSCy Schubert<th>Secret-Key Encryption </th> 50*7f2fe78bSCy Schubert</tr> 51*7f2fe78bSCy Schubert<tr> 52*7f2fe78bSCy Schubert<td> 53*7f2fe78bSCy SchubertKerberos prevents malicious attempts to intercept your password by 54*7f2fe78bSCy Schubertencrypting your password before transmitting it. In addition, once you 55*7f2fe78bSCy Schubertand the server have proved your identities to each other, Kerberos uses 56*7f2fe78bSCy Schubertsecret-key cryptography to secure the rest of your communications. This 57*7f2fe78bSCy Schuberthelps maintain your privacy and the integrity of your data.</td> 58*7f2fe78bSCy Schubert</tr> 59*7f2fe78bSCy Schubert </tbody></table> 60*7f2fe78bSCy Schubert</p><h2>Related Help</h2> 61*7f2fe78bSCy Schubert<ul id="helpul"> 62*7f2fe78bSCy Schubert<li><a href="HTML/Kerberos_Terminology.htm">Kerberos terminology</a></li> 63*7f2fe78bSCy Schubert<li><a href="HTML/Encryption_Types.htm">Encryption types</a></li> 64*7f2fe78bSCy Schubert<li><a href="HTML/How_Kerberos_Works.htm">How does Kerberos work?</a></li> 65*7f2fe78bSCy Schubert</ul> 66*7f2fe78bSCy Schubert 67*7f2fe78bSCy Schubert<script language="JavaScript"> 68*7f2fe78bSCy Schubertpopfont="Arial,.725," 69*7f2fe78bSCy SchubertpopupPhishing="A type of email scam. The scammer sends an email that appears to come from a legitimate company asking you to log on to the company website using the included link. The link takes you instead to a fake website modeled after that of the real company. If you try to log on, the fake website harvests your username and password for later malicious use." 70*7f2fe78bSCy SchubertpopupSpoofing="To 'spoof' means to fake. Hackers can spoof email (making you think the email came from a trusted source), websites (making you think a website is legitimate), and IP addresses. IP spoofing can be used to hijack your browser and take you to fradulent web page that looks legitimate and can be used harvest your username and password." 71*7f2fe78bSCy SchubertpopupPrincipal="Your principal is your Kerberos identity. It is your user name combined with the Kerberos realm you are using. For example: 'jdoe@SALES.WIDGET.COM' " 72*7f2fe78bSCy Schubert</script> 73*7f2fe78bSCy Schubert 74*7f2fe78bSCy Schubert<object id="popup" type="application/x-oleobject" classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11"> 75*7f2fe78bSCy Schubert</object> 76*7f2fe78bSCy Schubert</body></html> 77