Overview
Authentication Process
|
| • | Time stamp |
|
| • | Nonce |
Step | 2. | If the AS decrypts the message successfully, it authenticates the | |
|
| requesting user and issues a TGT. The TGT contains the user name, a | |
|
| session key for your use, and name of the server to be used for any | |
|
| subsequent communication. The reply message is encrypted using your | |
|
| secret key. | |
|
|
| |
NOTE |
| The AS decrypts the request only when the | |
|
| set in the AS request. If the | |
|
| issues the TGT if the principal is available in the Kerberos database. | |
|
|
| |
Step | 3. | The client decrypts the message using your secret key. The TGT and the | |
|
| session key from the message are stored in the client’s credential cache. | |
|
| These credentials are used to obtain tickets for each network service the | |
|
| principal wants to access. |
The Kerberos protocol exchange has the following important features:
•The authentication scheme does not require that the password be sent across the network, either in encrypted form or in clear text.
•The client (or any other user) cannot view or modify the contents of the TGT.
Step | 4. | To obtain access to a secured network service such as rlogin, rsh, rcp, |
|
| ftp, or telnet, the requesting client application uses the previously |
|
| obtained TGT in a dialogue with the TGS to obtain a service ticket. The |
|
| protocol is the same as used while obtaining the TGT, except that the |
|
| messages contain the name of the server and a copy of the previously |
|
| obtained TGT. |
Step | 5. | The TGS returns a new service ticket that the application client can use |
|
| to authenticate to the service. The service ticket is encrypted with the |
|
| service key shared between the KDC and the application server. |
Step | 6. | The application server authenticates the client using the service key |
|
| present in the keytab file. It decrypts the service ticket using the service |
|
| key and extracts the session key. Using the session key, the server |
|
| decrypts the authenticator and verifies the identity of the user. It also |
26 | Chapter 1 |