|
![]() |
|||
|
||||
OverviewThis handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the system's capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications. You will find thorough explanations of such key topics as: *Basic cryptography and hash functions *Mutual authentication *Establishing and changing passwords *Manipulating credentials *Installing the Key Distribution Center (KDC) *Optimizing configuration *Creating and administering a Kerberos database *Adding, deleting, and modifying a principal *Setting up cross-realm authentication *Extensible function calls *The GSS-API *The various versions of Kerberos and their operational differences In addition to these topics, Kerberos also discusses the effect of public key cryptography on the Kerberos protocol, its incorporation into Windows NT 5.0, and its use with smart cards and PC cards. With this book in hand, the security, flexibility, and convenience of Kerberos is brought within easy reach of today's time-constrained administrator. 0201379244B04062001 Full Product DetailsAuthor: Brian TungPublisher: Pearson Education (US) Imprint: Addison Wesley Dimensions: Width: 13.70cm , Height: 0.90cm , Length: 13.70cm Weight: 0.204kg ISBN: 9780201379242ISBN 10: 0201379244 Pages: 192 Publication Date: 27 May 1999 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsPreface xi. 1. Overview: A Kerberos FAQ. What Is Kerberos? What Is Kerberos Good For? What Versions Are Available? Where Can I Get Kerberos? What On-Line Information Is There? How Is Kerberos Used for Security? 2. Kerberos for Users. Using Kerberos. Manipulating Credentials. Changing Your Kerberos Password. Performing Basic Kerberos Operations. Using MIT-Kerberized Applications. Encrypting Your Session. Forwarding Tickets. Specifying the User. Knowing When Something Isn't Right. Using the Windows 95/NT Interface. Using Eudora. 3. Kerberos for Administrators. Knowing What You're Trying to Protect. Building the Kerberos Distribution. Installing the KDC. The krb5.conf Configuration File. The kdc.conf Configuration File. Creating the Kerberos Database. Setting Up the Administrative Principals. Starting the KDC and the Admin Server. Accessing the Database. Adding a New Principal. Deleting a Principal. Modifying a Principal. Changing a Password. Retrieving a Principal's Database Entry. Listing the Database Entries. Compiling a Keytab File. Removing Principals from a Keytab File. Finding Out What Commands Are Available. Quitting. Setting Up Cross-Realm Authentication. Administering an Application Server. 4. Kerberos for Developers. Contents of a Kerberized Application. Example of a Kerberized Application. The Client. The Server. Extensible Function Calls. Error Handling. Replay Caches. A Password-Changing Program. Other Kerberos API Calls. GSS-API. Understanding How the GSS-API Calls Work. Taking Advantage of GSS-API. 5. The Basics of Kerberos. The Origins of Kerberos. Principals. A Primer on Cryptography. Ciphers. One-Way Hashes. Authentication with Kerberos. The (High-Level) Details. Mutual Authentication. KDC = AS + TGS. Cross-Realm Authentication. The Kerberos Environment. A Note about Passwords. Local Security. 6. Other Versions of Kerberos. Pre-V5 and Commercial Versions. Kerberos V1, V2, V3. Kerberos V4. Bones, E-Bones, and Heimdal. TrustBroker. V4 and V5 Operational Differences. kinit. klist. kdestroy. V4 and V5 Anatomical Differences. Byte Ordering. Ticket Lifetimes. Delegation. Password Hashing. Preauthentication. Cryptographic Algorithms. 7. New Directions for Kerberos. Public Key Cryptography. The Basics of Public Key Cryptography. The Strength of Public Key Cryptography. Public Key Certification. Effect on the Kerberos Protocol. Use in Cross-Realm Authentication. Public Key Kerberos Today. Kerberos and Windows 2000. Smart Cards and Other Portable Devices. Smart Cards and PC Cards. PC Cards and the Kerberos Protocol. Appendix A. Glossary. Appendix B. Annotated Bibliography. Books. Papers. Internet Specifications. On-Line References. Index. 0201379244T04062001ReviewsAuthor InformationBrian Tung is a computer scientist at the University of Southern California's Information Sciences Institute, where he is currently designing and implementing public key extensions to Kerberos. An acknowledged Kerberos expert, Mr. Tung is the author and keeper of the much-respected and often-visited Kerberos Web page The Moron's Guide to Kerberos. 0201379244AB04062001 Tab Content 6Author Website:Countries AvailableAll regions |