answersLogoWhite

0

What is the sequence of the Kerberos authentication process?

Updated: 12/12/2022
User Avatar

MarkLivermoregp1293

Lvl 1
8y ago

Best Answer

6 steps

1. User requests ticket

2. KDS verfies credentials

3.user sends request for service

4. KDS verifies authorization

5. Request is sent to the service

6. Service is granted to user

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the sequence of the Kerberos authentication process?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Does kerberos require port based authentication?

No


How long does Kerberos authentication last?

5 minutes


What do you understand by Authentication and Encryption in the context of system security?

kerberos


What service is responsible for authentication and logon?

There are various services that ensure authentication during logon. Examples of these are Java Authentication and Authorization Service and Kerberos.


Which authentication protocol uses key distribution center server?

Kerberos


Which authentication protocol does IIS7's Windows Authentication module use for computers that are members of an Active Directory Domain?

Kerberos


What is the standard TCP port used for Kerberos authentication traffic in the US?

88 ??


Which technologies provide single sign-on authentication?

Kerberos SESAME Active Directory


What is Kerberos Authentication?

http://en.wikipedia.org/wiki/Kerberos_(protocol) Why ask a question when you can more easily and quickly read the answer on wikipedia? This is true for a large majority of questions that start with "What is"


What kind of authentication method is kerberos?

It's a mutual authentication; it verifies both user and sender of the ticket using symmetric keys.


Suppose an organization uses Kerberos for Authentication. In terms of security and service Availability what is the effect if AS or TGS goes down?

Q5. Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?


What is a reason to implement Kerberos over local system authentication?

Centralized file integrity protection!