140 likes | 155 Views
Learn about the Kerberos network authentication protocol, its basic concept, how it works, implementation details, and its pros and cons. Understand how Kerberos provides strong authentication for client/server applications.
E N D
Kerberos Network Authentication Protocol A Team 1 Presentation: Les Beckford Joe DeCicco Vera Rhoads Than Lam Steve Parshley DCS835 June 24, 2000
Agenda What is Kerberos? What is the basic concept? How does it work? Prerequisites Conceptual implementation Details in action Pros & Cons Summary
What is Kerberos? A network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography
What is the basic concept? Three entities authenticate each other, using private keys. 1. User ->Client 2. Kerberos Server 3. Application Server Kerberos Server Client User Application Server
How Does Kerberos Work? Prerequisites Principals list Authentication Server Ticket Granting Server Kerberos s/w Individual passwords Concept of Implementation Details in action
Kerberos Prerequisites Principals list Users Clients Application servers Authentication Server (AS) Ticket Granting Server (TGS) Kerberos s/w (V4 or V5) Individual passwords
Concept of Implementation Objective: secure network authentication to grant services to authorized users Authentication: Symmetric, two private keys Three two-way handshakes precede service Service: authorized services delivered from known to known
Username, PW -> AS < -AS returns TGT Start Client PW -> TGT, Kc, tgs <- Ticket, Kc S -> Ac <- Sc The Kerberos Model and Protocols
Pros/Cons of Kerberos Pros: Free, flexible, open standards, key security, ticket expiration, widespread acceptance, enhanced versions Cons: prerequisites to set up, management intensive, third party security assumed, password security assumed.
Summary Kerberos is, for the correct environments, a superior alternative to public-key, certificate-based authentication systems, such as SSL. With a proper understanding of its strengths and weaknesses, one can implement the protocol with confidence, at low cost, and with high efficiency.