188
IBM Certification Study Guide AIX HACMP
The following is simply a shortened description on how kerberos works. For
more details, the redbook
Inside the RS/6000 SP
, SG24-5145, covers the
subject in much more detail.
When dealing with authentication and Kerberos, three entities are involved:
the
client
, who is requesting service from a
server
; the second entity, and the
Key Distribution Center
or
Kerberos server
, which is a machine that manages
the database, where all the authentication data is kept and maintained.
Kerberos is a third-party system used to authenticate users or services that
are known to Kerberos as
principals
. The very first action to take regarding
Kerberos and principals is to register the latter to the former. When this is
done, Kerberos asks for a principal’s password, which is converted to a
principal (user or service) 56-bit key using the DES (Data Encryption
Standard) algorithm. This key is stored in the Kerberos server database.
When a client needs the services of a server, the client must prove its identity
to the server so that the server knows to whom it is talking.
Tickets are the means the Kerberos server gives to clients to authenticate
themselves to the service providers and get work done on their behalf on the
services servers. Tickets have a finite life, known as the ticket life span.
In Kerberos terms, to make a Kerberos authenticated service provider work
on behalf of a client is a three-step process:
• Get a ticket-granting ticket.
• Get a service ticket.
• Get the work done on the service provider.
The main role of the ticket-granting ticket service is to avoid unnecessary
password traffic over the network; so, the user should issue his password
only once per session. What this ticket-granting ticket service does is to give
the client systems a ticket that has a certain time span, whose purpose is to
Also spelled Cerberus - The watchdog of Hades, whose duty was to guard
the entrance (against whom or what does not clearly appear); it is known to
have had three heads.
- Ambrose Bierce,
The Enlarged Devil’s Dictionary
Kerberos
Содержание AIX HACMP SG24-5131-00
Страница 2: ......
Страница 10: ...viii IBM Certification Study Guide AIX HACMP...
Страница 12: ...x IBM Certification Study Guide AIX HACMP...
Страница 14: ...xii IBM Certification Study Guide AIX HACMP...
Страница 18: ...xvi IBM Certification Study Guide AIX HACMP...
Страница 24: ...6 IBM Certification Study Guide AIX HACMP...
Страница 110: ...92 IBM Certification Study Guide AIX HACMP...
Страница 133: ...HACMP Installation and Cluster Definition 115...
Страница 134: ...116 IBM Certification Study Guide AIX HACMP...
Страница 160: ...142 IBM Certification Study Guide AIX HACMP...
Страница 200: ...182 IBM Certification Study Guide AIX HACMP...
Страница 216: ...198 IBM Certification Study Guide AIX HACMP...
Страница 222: ...204 IBM Certification Study Guide AIX HACMP...
Страница 226: ...208 IBM Certification Study Guide AIX HACMP...
Страница 232: ...214 IBM Certification Study Guide AIX HACMP...
Страница 240: ...Printed in the U S A SG24 5131 00 IBM Certification Study Guide AIX HACMP SG24 5131 00...