How does Kerberos work?
What will be an ideal response?
Kerberos is typically used when someone on a network attempts to use a network service, and the service wants assurance that the user is who he says he is. The user is provided a ticket that is issued by the Kerberos authentication server, much like a driver's license is issued by the DMV. This ticket contains information linking it to the user. The user presents this ticket to the network for a service. The service then examines the ticket to verify the identity of the user. If all information is confirmed, the user is accepted.Kerberos tickets share some of the same characteristics as a driver's license: tickets are difficult to copy (because they are encrypted), they contain specific user information, they restrict what a user can do, and they expire after a few hours or a day.
You might also like to view...
To enable centralized management of BitLocker, you need to install which of the following on each computer?
A. UE-V profile B. WDS client C. MBAM agent D. WSUS node
In the accompanying figure of Windows 10, Box A represents a(n) _____.
A. ?screen tab B. ?app pane C. ?keyboard link D. ?live tile
The software application used to download and view Web pages is called a ____.
A. navigator B. browser C. viewer D. surfer
The ____ is the subsystem that performs such mathematical and logical operations as addition, subtraction, and comparison for equality.
a. I/O controller b. ALU c. CPU d. SASD