Kerberos: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
imported>Sandy Harris (link to Kerberos Primer) |
||
Line 4: | Line 4: | ||
The Kerberos protocol is specified in RFC 4120. There is an active [http://www.ietf.org/html.charters/krb-wg-charter.html working group] at the [[IETF]] with many more documents. Microsoft's usage is documented in RFC 3244 and RFC 4757. | The Kerberos protocol is specified in RFC 4120. There is an active [http://www.ietf.org/html.charters/krb-wg-charter.html working group] at the [[IETF]] with many more documents. Microsoft's usage is documented in RFC 3244 and RFC 4757. | ||
There is a [http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html FAQ]. | There is a [http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html FAQ]. IBM provide a [http://www.ibm.com/developerworks/ibm/library/it-kerbero.html Kerberos primer]. |
Revision as of 07:59, 26 November 2009
Kerberos is a network authentication system developed at MIT [1] and used (not without controversy [2]) by all versions of Microsoft Windows since Windows 2000 [3]. A central trusted server provides "tickets" which allow other machines to authenticate each other.
The Kerberos protocol is specified in RFC 4120. There is an active working group at the IETF with many more documents. Microsoft's usage is documented in RFC 3244 and RFC 4757.
There is a FAQ. IBM provide a Kerberos primer.