Kerberos White Paper
Executive Summary | 2 |
Problem Statement | 2 |
Historical Evolution of Kerberos | 3 |
Why Kerberos? | 3 |
Kerberos Basics | 3 |
How Kerberos Works | 4 |
Authentication Process | 4 |
Kerberos Products on | 6 |
PAM Kerberos | 6 |
Kerberos Client | 7 |
HP Kerberos Server Version 3.1 | 7 |
Introduction to LDAP | 8 |
Kerberos Server on | 8 |
Kerberos Server on | 8 |
Benefits of an LDAP Back End | 8 |
Integrating the Kerberos Principal into the LDAP Directory | 8 |
Generic Security Service Application Programming Interface | 9 |
Secure Internet Services (SIS) | 10 |
ftp | 10 |
rcp | 10 |
rlogin/rsh | 10 |
telnet | 10 |
Common Internet File System (CIFS) | 10 |
Secure Shell | 10 |
Compatibility/Interoperability | 11 |
Summary | 11 |
References | 11 |
Glossary | 12 |