Kerberos has its own terminology to define various aspects of the service. Before learning how Kerberos works, it is important to learn the following terms.
1.
Authentication server (AS) :-- A server that issues
tickets for a desired service which are in turn given to users for access to the service. The AS responds to requests from clients
who do not have or do not send credentials with a request. It is usually used
to gain access to the ticket-granting server (TGS) service by issuing a
ticket-granting ticket (TGT). The AS usually runs on the same host as the key
distribution center (KDC).
2.
Cipher text :-- Encrypted data.
3.
Client :-- An entity on the network
(a user, a host, or an application) that can receive a ticket from Kerberos.
4.
Credentials :-- A temporary set of electronic credentials that
verify the identity of a client for a particular service. Also called a ticket.
5.
Credential cache or ticket file:-- A file which contains the keys for encrypting
communications between a user and various network services. Kerberos 5 supports
a framework for using other cache types, such as shared memory, but files are
more thoroughly supported.
6.
Crypt hash :--
A
one-way hash used to authenticate users. These are more secure than using
unencrypted data, but they are still relatively easy to decrypt for an
experienced cracker.
7.
GSS-API :-- The Generic Security Service Application
Program Interface (defined in RFC-2743 published by The Internet Engineering
Task Force) is a set of functions which provide security services. This API is
used by clients and services to authenticate to each other without either
program having specific knowledge of the underlying mechanism. If a network
service (such as cyrus-IMAP) uses GSS-API, it can authenticate using Kerberos.
8.
Hash :-- Also known as a hash
value. A value generated by passing a string through a hash function.
These values are typically used to ensure that transmitted data has not been
tampered with.
9.
Hash function :-- A way of generating a
digital "fingerprint" from input data. These functions rearrange, transpose or
otherwise alter data to produce a hash value.
10.
Key :-- Data used when encrypting
or decrypting other data. Encrypted data cannot be decrypted without the proper
key or extremely good fortune on the part of the cracker.
11.
Key distribution center (KDC) :-- A service that issues
Kerberos tickets, and which usually run on the same host as the ticket-granting
server (TGS).
12.
Keytab (or key table) :-- A file
that includes an unencrypted list of principals and their keys. Servers
retrieve the keys they need from keytab files instead of using kinit. The default keytab file is /etc/krb5.keytab. The KDC administration
server, /usr/kerberos/sbin/kadmind, is the only service
that uses any other file (it uses /var/kerberos/krb5kdc/kadm5.keytab).
13.
Kinit :-- The kinit command allows a principal who has already logged in to obtain
and cache the initial ticket-granting ticket (TGT). Refer to the kinit man page for more information.
14.
Principal (or principal name) :-- The principal is the
unique name of a user or service allowed to authenticate using Kerberos. A
principal follows the form root[/instance]@REALM. For a typical user, the
root is the same as their login ID. The instance is optional. If the
principal has an instance, it is separated from the root with a forward slash
("/"). An empty string ("") is considered a valid instance
(which differs from the default NULL instance), but using it
can be confusing. All principals in a realm have their own key, which for users
is derived from a password or is randomly set for services.
15.
Realm :-- A network that
uses Kerberos, composed of one or more servers called KDCs and a potentially
large number of clients.
16.
Service :-- A program accessed over
the network.
17.
Ticket :-- A temporary set of electronic credentials that
verify the identity of a client for a particular service. Also called
credentials.
18.
Ticket-granting server (TGS) :-- A server
that issues tickets for a desired service which are in turn given to users for
access to the service. The TGS usually runs on the same host as the KDC.
19.
Ticket-granting ticket (TGT) :-- A special
ticket that allows the client to obtain additional tickets without applying for
them from the KDC.
20.
Unencrypted password :-- A plain
text, human-readable password.
hi,
very useful, it has been a while since i read RH333, but i once again recalled every thing.
thank you buddy
--
Regards
S.Manikandan(BE,RHCSS, RHCE),
SysAdmin
E-Mail:- vijaysomt@gmail.com
mobile:- +91-9865313396
Wellcome Vijay.................