Overview

Authentication Process

 

Figure 1-1 illustrates the actions of the components and the Kerberos

 

protocol in a secured environment.

Figure 1-1Authentication Process

The following is a description of how a client and server authenticate each other using Kerberos:

Step 1. You can begin to use a Kerberos-secured application by entering your principal name and password. Optionally, you can request specific ticket flags and specify the key type to be used to construct the secret key. You can also accept the default values configured for the client.

You can send the following information to the Authentication Service (AS) to obtain credentials:

28

Chapter 1