DekGenius.com
[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

abstract syntax 
Abstract Syntax Notation One  [See ASN.1]
account logon auditing 
account management (PAM) 
ACL files 
active attacks  2nd 
Active Directory domain, establishing 
Active Port tool 
add command (Heimdal kadmin) 
add command (Heimdal ktutil) 
addent command (MIT ktutil) 
addprinc command (MIT kadmin) 
addressless tickets 
admin_server variable 
admind4 daemon 
administration 
Aeneid 
AES (Advanced Encryption Standard) 
AFS network filesystem Kerberos 4-based service 
Andrew File System 
Apache mod_auth_kerb module  [See mod_auth_kerb module]
appdefaults stanza 
Apple Mail.app 
application servers
    authentication of 
    Kerberos software, installing on 
applications 
    configuring 
    Kerberos, types of support 
    web-based, Kerberos and 
apxs2 program 
AS_REP (Authentication Server Reply) messages 
AS_REQ (Authentication Server Request) messages 
ASN.1 (Abstract Syntax Notation One) 
ASs (Authentication Servers)  2nd 
    initial authentication with PKINIT 
asymmetric key cryptography  [See public key cryptography]
Athena Technical Plan  2nd 
attacks 
    active attacks  2nd 
    brute-force attacks 
    clients, root compromise of 
    denial of service 
    dictionary attacks 
    exploitation of software flaws 
    insider attacks 
    man-in-the-middle attacks 
    replay attacks 
    servers, root compromise of 
    social engineering 
    theft of administrators' passwords 
    theft of user credentials 
auditing  2nd  [See also logging]3rd 
authentication  2nd 
    against directories 
    cross-realm using PKCROSS 
    HTTP methods 
    Kerberos, advantages of 
    mutual authentication  2nd 
    pre-authentication  2nd 
    web-based using Kerberos 
Authentication Servers  [See ASs]
authenticators 
authorization 
    administrative privileges, configuring for principals (MIT Kerberos) 

[ Team LiB ]