1.3 Goals
The Kerberos system has several goals. It strives to improve security
and convenience at the same time. First is the goal of centralizing
authentication into one server (or set of servers). The Kerberos
system operates through a set of centralized Key
Distribution Centers, or KDCs. Each KDC
on your network contains a database of usernames and passwords for
both users and Kerberos-enabled services. Centralizing this
information eases the burden on administrators, as they now only need
to maintain this single username/password database. In addition, it
provides an advantage to security administrators, who now only have a
small set of machines on which usernames and passwords are stored,
and can specially harden and protect these machines accordingly.
Kerberos provides a secure means of authentication over insecure
networks. Instead of sending plain-text passwords over the network in
the clear, Kerberos uses encrypted tickets to
prove the identity of both end users and network servers. These
tickets are generated by the centralized Key Distribution Centers on
behalf of users who wish to authenticate to the network. When using
Kerberos, user passwords are never sent over the network in the
clear.
In addition, implementing the other two elements of the
"three A's"
(authorization and auditing—authentication, of course, is the
third A) are made easier using Kerberos. While Kerberos does not
directly provide authorization or auditing services,
Kerberos' ability to accurately identify both users
and services allows programmers and administrators to provide
authorization and auditing to further enhance the security of their
network. We'll talk more about what exactly
authorization and auditing are in the next chapter.
|