DekGenius.com
[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

kadmin 
kadmin commands
    logging 
    password expiration, setting 
kadmin.local 
kadmin.local program 
kadmind daemon  2nd  3rd 
kadmind variable 
kdb5_util program 
    create command 
kdc daemon 
kdc variable 
kdc.conf file  2nd 
KDCs (Key Distribution Centers)  2nd  3rd 
    cross-realm communication using PKCROSS 
    database replication 
    discovery over DNS 
    logging 
    messages to and from 
    MIT Kerberos 5, adding slaves 
    MIT version, installing from source 
    security
        continual maintenance 
    security concerns 
        Unix 
    server-client ratio, Windows vs. Unix 
    servers, compromise of 
    software build and install 
    using Windows domain controllers for Unix clients 
kerberized services 
kerberized telnet, debugging with 
Kerberos  2nd  3rd 
    application server packages 
    authentication, advantages for 
    case study  [See case study]
    client packages 
        electronic mail 
        PuTTY 
        Reflection X 
    client software  [See applications]
    clock synchronization, need for 
    and DNS 
    and DNS (Domain Name Service) 
    evolution of the protocol 
    future developments  2nd 
        cryptography, improvements 
        web services, use in 
    Heimdal  [See Heimdal Kerberos]
    implementation 
    man-in-the-middle attacks, protection against 
    MIT  [See MIT Kerberos]
    NAT, and 
    Needham-Schroeder protocol, compared to 
    network ports 
    protocol security issues 
    security  [See security]
    services 
    smart cards and 
    software flaws, attacks against 
    transparent logins using PAM  [See PAM]
    troubleshooting the configuration 
    web-based applications and 
    Windows
        implementation  [See Windows domain controllers]
        support in 
Kerberos 4  2nd 
    and Kerberos 5 
    ASs (Authentication Servers) 
    DES and 
    limitations of 
    Needham-Schroeder protocol, compared to 
    service principals 
    TGSs (Ticket Granting Servers) 
Kerberos 5  2nd  3rd  [See also MIT Kerberos; Heimdal Kerberos]
    5-to-4 ticket translation 
    backwards compatiblilty to Kerberos 4 
    encryption options 
    extensible encryption type support 
    GSSAPI 
    integrating Kerberos 4 services 
    passwords, changing in 
    pre-authentication 
    principals 
    public key encryption enhancements 
    public key extensions 
    SPNEGO 
    ticket options 
Kerberos Clarifications 
    reduced dependency on DNS for domain name-to-realm mapping 
Kerberos Set/Change Password Version 2 
key certification 
Key Distribution Centers  [See KDCs]
key version numbers 
keys 
    distribution (public key cryptography) 
    length and security 
    master keys 
    private keys 
    public keys 
    session keys  2nd  3rd 
keytab files  2nd 
keytabs 
    administration
        Heimdal Kerberos 
        MIT Kerberos 
        Windows domain controllers 
    and encryption type mismatches 
kpasswdd daemon 
kpropd daemon 
kpropd.acl file 
KRB_ERROR messages 
krb5.conf file 
    example 
    Heimdal Kerberos 
    hostname-to-Kerberos realm mapping 
    logging options
        Heimdal Kerberos 
        MIT Kerberos 
    MIT Kerberos 
    troubleshooting 
krb5.keytab file 
krb5_prop 
krb524 protocol  2nd 
krb524d daemon  2nd 
krb5kdc daemon 
krbtgt 
ksetup tool 
kstash command 
ktadd command (MIT kadmin)  2nd 
kth-krb package 
ktpass program 
    common parameters 
    keytab generation 
ktutil  [See under Heimdal KerberosMIT Kerberos]
kvno 

[ Team LiB ]