How does Kerberos work?

What will be an ideal response?


Kerberos is typically used when someone on a network attempts to use a network service, and the service wants assurance that the user is who he says he is. The user is provided a ticket that is issued by the Kerberos authentication server, much like a driver's license is issued by the DMV. This ticket contains information linking it to the user. The user presents this ticket to the network for a service. The service then examines the ticket to verify the identity of the user. If all information is confirmed, the user is accepted.Kerberos tickets share some of the same characteristics as a driver's license: tickets are difficult to copy (because they are encrypted), they contain specific user information, they restrict what a user can do, and they expire after a few hours or a day.

Computer Science & Information Technology

You might also like to view...

To enable centralized management of BitLocker, you need to install which of the following on each computer?

A. UE-V profile B. WDS client C. MBAM agent D. WSUS node

Computer Science & Information Technology

In the accompanying figure of Windows 10, Box A represents a(n) _____.

A. ?screen tab B. ?app pane C. ?keyboard link D. ?live tile

Computer Science & Information Technology

The software application used to download and view Web pages is called a ____.

A. navigator B. browser C. viewer D. surfer

Computer Science & Information Technology

The ____ is the subsystem that performs such mathematical and logical operations as addition, subtraction, and comparison for equality.

a. I/O controller b. ALU c. CPU d. SASD

Computer Science & Information Technology