- Chapter 1
Provides a gentle introduction to Kerberos, and provides an overview
of its history and features. It provides a gentle prologue by
bringing you from the reasons for the development of Kerberos at MIT
through to the latest versions of the protocol.
- Chapter 2
Continues where Chapter 1 left off, presenting an
introduction to the concepts and terminology that permeate the use
and administration of Kerberos. The knowledge of these concepts is
essential to the understanding of how Kerberos works as well as how
to use and administer it.
- Chapter 3
Speaking of how Kerberos works, Chapter 3 reviews
the Kerberos protocol via a historical perspective that takes you
through the evolution of Kerberos from an academic paper published in
1978 to the modern Kerberos 5 protocol used today. Chapter 3 provides a detailed yet easy-to-follow
description of how the Kerberos protocol works and describes the
numerous encrypted messages that are sent back and forth.
- Chapter 4
Takes you from the realm of the theoretical and conceptual into the
practical aspects involved in administering a Kerberos system. Here,
the Kerberos implementations that will be discussed throughout the
book are introduced, and the basics of the installation and
administration of a Kerberos authentication system are described.
- Chapter 5
When things go wrong with your Kerberos implementation, Chapter 5 will come in handy. Chapter 5 provides a methodology for diagnosing
Kerberos-related problems and demonstrates some of the more common
errors that can occur.
- Chapter 6
Provides a detailed look at the practical security concerns related
to running Kerberos.
- Chapter 7
Reviews some common software that can be configured to use Kerberos
- Chapter 8
Provides information about more advanced topics in running a Kerberos
authentication system, including how to interoperate between Unix and
Windows Kerberos implementations. This chapter also reviews how
multiple Kerberos realms can cooperate and share resources through
- Chapter 9
Presents a sample case study that demonstrates the implementation
tasks presented earlier in a practical example.
- Chapter 10
Finishes off the book with a description of the future directions
Kerberos is taking. We'll examine new protocol
enhancements that will enable Kerberos to take advantage of new
security and encryption technologies.
- Appendix A
Provides an in-depth reference on the various commands avialable to