Presentation on theme: "Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike."— Presentation transcript:
Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike License. Some Rights Reserved
Single Sign-On 1) I login to my desktop 2) After that initial login I'm given a ticket 3) I can ssh/telnet to other machines on the network without typing a password again! My password is not cached or resent. My ticket allows me to request more tickets.
When I want to be root ● I authenticate with my bethlynn.root@CS.CMU.EDU password bethlynn.root@CS.CMU.EDU ● Now I have full root privileges on the local host ● I can also use this ticket to ssh/telnet to other machines to also be root on them too
What I didn't tell you ● How Kerberos works. ● MIT vs Heimdal ● Who is Cerberus? ● How to configure Kerbeors ● How OpenAFS uses Kerberos
O'Reilly to the Rescue ● “Kerberos The Definitive Guide” by Jason Garman ● The Owl book ● $34.95