Configuration Guide for Kerberos Client Products on HP-UX 11.0 | HP-UX 11i v1 | HP-UX 11i v1.6 | HP-UX 11i v2
Overview
Kerberos Overview
Chapter 120
and services. Kerberos allows entities to authenticate themselves,
without having to transmit their passwords in clear text form, over the
networks.
Figure 1-1 Kerberos V5 Protocol
Given below is a step-wise procedure of how a client and server
authenticate each other using Kerberos. The step numbers match with
the numbered arrows in Figure 1-1.
Step 1. The user begins to use a Kerberized application by entering the user
name and password. Optionally, the user can request for specific ticket
flags and specify the key type to be used for constructing the secret key.
The user can also accept the default, configured for the client.
The user sends the following information to obtain credentials:
Client, Server, T, N; where
• Client indicates the user name, also referred to as the principal
name
• Server indicates the Application Server