20 Kerberos
20 Kerberos
20 Kerberos
CS 703
Department of CSE/IT
Kerberos
Kerberos is a network authentication protocol.
Similarly, a server can also identify itself across the same insecure network
connection. Communication between the client and the server can be
secure after the client and server have used Kerberos to prove their
identities.
From this point on, subsequent communication between the two can be
encrypted to ensure privacy and data integrity.
Kerberos client/server authentication requirements are as follows:
• Transparency – that users are not aware that authentication is taking place
beyond providing passwords.
• Scalability – that Kerberos systems accept and support new clients and servers.
Database:
The Authentication Server verifies access rights of users in database.
Step-1:
User logon and request services on host. Thus user request for ticket-
granting-service.
Step-2:
Authentication Server verifies user’s access right using database and then
gives ticket-granting-ticket and session key. Results are encrypted using
Password of user.
Step-3:
Decryption of message is done using the password then send the ticket to
Ticket Granting Server. The Ticket contain authenticators like user name
and network address.
Step-4:
Ticket Granting Server decrypts the ticket send by User and authenticator
verifies the request then creates the ticket for requesting services from the
Server.
Step-5:
User send the Ticket and Authenticator to the Server.
Step-6:
Server verifies the Ticket and authenticators then generate the access to
the service. After this User can access the services.