Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
The Concept Map you are trying to access has information related to:
Chapter 7 Kerberos, Kerberos is used in the mount service To authernticate the user's identity User's UserID and GroupID are stored at the server with the client's IP address, Case Study: Kerberos autherntication and key distribution service Standardized and now included in many operating systems Internet RFC 1510, OSF DCE. BSD UNIX, Linux, Windows 2000, NT, XP. Available from MIT, Case Study: Kerberos autherntication and key distribution service Kerberos server creates a shared secret key for any required server and sends it (encrypted) to the user's computer User's password is the inital secret shared with Kerberos, Kerberized NFS This approach has some problems Can't accommodate multiple users sharing the same client computer. All remote filestores must be mounted each time a user logs in, Kerberized NFS Kerberos protocol is too costly to apply on each NFS operation Kerberos is used in the mount service, Kerberized NFS For each file request: UserID and GroupID are sent encrpted in the shared session key. The UserID and GroupID must match those stored at the server. IP addresses must also match, Case Study: Kerberos autherntication and key distribution service Secures communication with servers on a local network Developed a MIT in the 1980s to provide security across a large campus network users. Based on Needham-Schroeder protocol