System security and integrity within a network can be unwieldy. It
can occupy the time of several administrators just to keep track of what
services are being run on a network and the manner in which these services are
used.
Further, authenticating
users to network services can prove dangerous when the method used by the
protocol is inherently insecure, as evidenced by the transfer of unencrypted
passwords over a network using the traditional FTP and Telnet protocols.
Kerberos is a way to eliminate the need for protocols that allow unsafe methods of authentication, thereby enhancing overall network security.
Kerberos is a way to eliminate the need for protocols that allow unsafe methods of authentication, thereby enhancing overall network security.
Kerberos is a network
authentication protocol created by MIT, and uses symmetric-key cryptography to
authenticate users to network services, which means passwords are never
actually sent over the network.
Consequently, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted.
Consequently, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted.