5 Minute Cyber: How Kerberos Authentication Works

preview_player
Показать описание
Kerberos is an authentication protocol widely used in information systems today. It was originally developed in the 1980s by MIT as a way for multiple operating systems to authenticate over a network without ever transmitting passwords.

There are three main components in a Kerberos realm. We discuss all of them and the step-by-step authentication process in this episode of 5 minute cyber.
Рекомендации по теме
Комментарии
Автор

Thanks. The analogy with the hotel service really lands it.

hanweiz
Автор

Great explanation. Thanks for uploading.
Would have been better to emphasize on the KDC part that KDC is made of AS ( authentication server ) and TGS ( ticket granting service) .
AS grants TGT ( ticket granting ticket ) to the client after the client has been checked by AS, then once the client ( use ) decrypt the TGT from AS, the client sends TGT to TGS ....etc

imhotep
Автор

My next video suggestion:
How email headers are generated and what are the common ways that could help us identify spam/phish email

whats-better
Автор

Great explaination in 5 mins.
Easy to understand.

ashubidkar
Автор

Outh/oidc pls...nice Kerberos explanation

ramakrishnak
Автор

Really good job explaining this! Thank you!

randomangel
visit shbcf.ru