Kerberos Authentication and Domain Security (Internet Protocol (IP)…
Kerberos Authentication and Domain Security
Internet Protocol (IP) Security
Two modes of operation :
special gateways perform cryptographic processing in addition to the source and destination hosts.
the source and destination hosts must directly perform all cryptographic operations.
supports network-level data integrity, data confidentiality, data origin authentication, and replay protection.
can be used for the setting up of virtual private networks (VPNs) in a secure manner.
It can use cryptography to provide security.
a set of protocols that provides security for Internet Protocol.
Trusts Relationships between domains
If a user or application is authenticated by one domain, its authentication is accepted by all other domains that trust the authenticating domain.
When there are trust relationships between domains, the authentication mechanism for each domain trusts the authentication mechanism for all other trusted domains.
A trust relationship between two domains enables user accounts and global groups to be used in a domain other than the domain where the accounts are defined
an administration and communication link between two domains.
to set security protocols for part of a network, including password protocols, access levels and much more.
a security policy
specifically applied to a given domain or set of computers or drives in a given system.
Term in Kerberos Authentication
i.e Kerberos Ticket exchange
Four Benefits using Kerberos authentication
More efficient authentication to servers.
a computer network authentication protocol
works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.