HP UX Kerberos Data Security Software manual Kerberos White Paper

Page 1

Kerberos White Paper

Executive Summary

2

Problem Statement

2

Historical Evolution of Kerberos

3

Why Kerberos?

3

Kerberos Basics

3

How Kerberos Works

4

Authentication Process

4

Kerberos Products on HP-UX

6

PAM Kerberos (PAM-Kerberos)

6

Kerberos Client (KRB5-Client) Software

7

HP Kerberos Server Version 3.1

7

Introduction to LDAP

8

Kerberos Server on HP-UX with Native Back End

8

Kerberos Server on HP-UX with LDAP Back End

8

Benefits of an LDAP Back End

8

Integrating the Kerberos Principal into the LDAP Directory

8

Generic Security Service Application Programming Interface (GSS-API)

9

Secure Internet Services (SIS)

10

ftp

10

rcp

10

rlogin/rsh

10

telnet

10

Common Internet File System (CIFS)

10

Secure Shell

10

Compatibility/Interoperability

11

Summary

11

References

11

Glossary

12

Image 1
Contents Kerberos White Paper Executive Summary Problem StatementHistorical Evolution of Kerberos Why Kerberos?Kerberos Basics How Kerberos Works Authentication ProcessKerberos Authentication Protocol PAM Kerberos PAM-Kerberos Kerberos Products on HP-UXHP Kerberos Server Version Kerberos Client KRB5-Client SoftwareIntroduction to Ldap Integrating a Kerberos Principal in to the Ldap Directory Common Internet File System Cifs Secure Internet Services SISSecure Shell Summary Compatibility/InteroperabilityReferences Name Definition GlossaryTGT
Related manuals
Manual 327 pages 9.34 Kb Manual 285 pages 23.05 Kb