[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
kadmin
kadmin commands logging
password expiration, setting
kadmin.local
kadmin.local program
kadmind daemon
2nd
3rd
kadmind variable
kdb5_util program
create command
kdc daemon
kdc variable
kdc.conf file
2nd
KDCs (Key Distribution Centers)
2nd
3rd
cross-realm communication using PKCROSS
database replication
discovery over DNS
logging
messages to and from
MIT Kerberos 5, adding slaves
MIT version, installing from source
security continual maintenance
security concerns
Unix
server-client ratio, Windows vs. Unix
servers, compromise of
software build and install
using Windows domain controllers for Unix clients
kerberized services
kerberized telnet, debugging with
Kerberos
2nd
3rd
application server packages
authentication, advantages for
case study
[See case study] client packages
electronic mail
PuTTY
Reflection X
client software
[See applications] clock synchronization, need for
and DNS
and DNS (Domain Name Service)
evolution of the protocol
future developments
2nd
cryptography, improvements
web services, use in
Heimdal
[See Heimdal Kerberos] implementation
man-in-the-middle attacks, protection against
MIT
[See MIT Kerberos] NAT, and
Needham-Schroeder protocol, compared to
network ports
protocol security issues
security
[See security] services
smart cards and
software flaws, attacks against
transparent logins using PAM
[See PAM] troubleshooting the configuration
web-based applications and
Windows implementation
[See Windows domain controllers] support in
Kerberos 4
2nd
and Kerberos 5
ASs (Authentication Servers)
DES and
limitations of
Needham-Schroeder protocol, compared to
service principals
TGSs (Ticket Granting Servers)
Kerberos 5
2nd
3rd
[See also MIT Kerberos; Heimdal Kerberos] 5-to-4 ticket translation
backwards compatiblilty to Kerberos 4
encryption options
extensible encryption type support
GSSAPI
integrating Kerberos 4 services
passwords, changing in
pre-authentication
principals
public key encryption enhancements
public key extensions
SPNEGO
ticket options
Kerberos Clarifications
reduced dependency on DNS for domain name-to-realm mapping
Kerberos Set/Change Password Version 2
key certification
Key Distribution Centers
[See KDCs] key version numbers
keys
distribution (public key cryptography)
length and security
master keys
private keys
public keys
session keys
2nd
3rd
keytab files
2nd
keytabs
administration Heimdal Kerberos
MIT Kerberos
Windows domain controllers
and encryption type mismatches
kpasswdd daemon
kpropd daemon
kpropd.acl file
KRB_ERROR messages
krb5.conf file
example
Heimdal Kerberos
hostname-to-Kerberos realm mapping
logging options Heimdal Kerberos
MIT Kerberos
MIT Kerberos
troubleshooting
krb5.keytab file
krb5_prop
krb524 protocol
2nd
krb524d daemon
2nd
krb5kdc daemon
krbtgt
ksetup tool
kstash command
ktadd command (MIT kadmin)
2nd
kth-krb package
ktpass program
common parameters
keytab generation
ktutil
[See under Heimdal KerberosMIT Kerberos] kvno
|