Kerberos White Paper

Kerberos White Paper
Executive Summary .............................................................................................................................. 2
Problem Statement ............................................................................................................................... 2
Historical Evolution of Kerberos ............................................................................................................. 3
Why Kerberos? ................................................................................................................................... 3
Kerberos Basics................................................................................................................................... 3
How Kerberos Works........................................................................................................................... 4
Authentication Process.......................................................................................................................... 4
Kerberos Products on HP-UX.................................................................................................................. 6
PAM Kerberos (PAM-Kerberos) .......................................................................................................... 6
Kerberos Client (KRB5-Client) Software ............................................................................................... 7
HP Kerberos Server Version 3.1......................................................................................................... 7
Introduction to LDAP ..................................................................................................................... 8
Kerberos Server on HP-UX with Native Back End.............................................................................. 8
Kerberos Server on HP-UX with LDAP Back End................................................................................ 8
Benefits of an LDAP Back End ........................................................................................................ 8
Integrating the Kerberos Principal into the LDAP Directory ................................................................. 8
Generic Security Service Application Programming Interface (GSS-API) .................................................. 9
Secure Internet Services (SIS) ........................................................................................................... 10
ftp ............................................................................................................................................ 10
rcp ........................................................................................................................................... 10
rlogin/rsh.................................................................................................................................. 10
telnet......................................................................................................................................... 10
Common Internet File System (CIFS).................................................................................................. 10
Secure Shell .................................................................................................................................. 10
Compatibility/Interoperability ............................................................................................................. 11
Summary .......................................................................................................................................... 11
References ........................................................................................................................................ 11
Glossary........................................................................................................................................... 12

Summary of content (13 pages)