White Papers

7 Dell Power Edge M1000e Chassis Management Controller Version 4.5 - Single Sign- On and Kerberos Model
2. Kerberos Workflow
The following section describes how Kerberos functions.
1.
Creating the Aunthenticator
The Client creates an authenticator (red lock), and a portion of which is not encrypted, for example the
Username. This enables the domain controller to find out who is trying to authenticate. The other portion of the
aunthenticator is encrypted using Users password (red key).
KDC first searches for the user in its database. If it finds the user, then KDC opens the authenticator using the key,
for example the password, which it holds for the user. In case KDC does not find the user, then it means the user
is not authentic. After this authentication is done, the user need not enter the password again.