HP UX Kerberos Data Security Software manual Compatibility/Interoperability, Summary, References

Page 11

client/server architecture supports the SSH-1 and SSH-2 protocols and provides secured remote login, file transfer, and remote command execution.

HP-UX Secure Shell uses hashing to ensure data integrity and provides secure tunneling features, port forwarding, and an SSH agent to maintain private keys on the client. HP-UX Secure Shell supports the following authentication methods:

ƒKerberos 5/GSS-API

ƒPassword

ƒPublic key

ƒHost-based

HP supports HP-UX Secure Shell at no additional cost to customers with HP-UX support agreements. HP-UX Secure Shell is a fully tested HP product. The following technologies are tested with HP-UX Secure Shell:

ƒKerberos 5/GSS-API

ƒIPv6

ƒTrusted Systems

ƒTCP Wrappers

ƒPAM (PAM_UNIX, PAM_Kerberos, PAM_LDAP)

Compatibility/Interoperability

Because of its widespread acceptance and implementation in other operating systems, including Windows 2000 ®, Windows 2003, Solaris, and Linux, the Kerberos authentication protocol can interoperate in a heterogeneous environment allowing users on machines running one operating system to securely authenticate themselves on hosts of a different operating system.

Summary

Adding Kerberos to a network can increase the overall security available to the users and administrators of that network. Remote sessions can be securely authenticated and encrypted. In addition, Kerberos allows the user and service principal’s database to be managed securely from any machine that supports the Kerberos protocol. All HP-Kerberos products are interoperable with other RFC 1510 compliant Kerberos implementations, and with MS Windows 2000 Active Directory services.

References

This section includes the URLs that customers can use if they would like to learn more about Kerberos and URLs that link to information about support, services, and accessibility.

1.Kerberos Manuals on the HP documentation website: http://www.docs.hp.com/hpux/internet/index.html#Kerberos

2.The ITRC Website at http://itrc.hp.com where there is a wealth of information available for all HP- UX products, regarding maintenance, support, training and education.

Image 11
Contents Kerberos White Paper Executive Summary Problem StatementKerberos Basics Why Kerberos?Historical Evolution of Kerberos How Kerberos Works Authentication ProcessKerberos Authentication Protocol PAM Kerberos PAM-Kerberos Kerberos Products on HP-UXHP Kerberos Server Version Kerberos Client KRB5-Client SoftwareIntroduction to Ldap Integrating a Kerberos Principal in to the Ldap Directory Secure Shell Secure Internet Services SISCommon Internet File System Cifs References Compatibility/InteroperabilitySummary Name Definition GlossaryTGT
Related manuals
Manual 327 pages 9.34 Kb Manual 285 pages 23.05 Kb