⇤ ← Revision 1 as of 2005-12-05 02:40:41
Size: 13
Comment:
|
Size: 1145
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
= Kerberos = |
|
Line 2: | Line 4: |
|| authentication ||||<(> || || authentication server||||<(> || || Kerberos||||<(> || || Kerberos realm||||<(> || || Propagating cipher block chaining (PCBC) mode||||<(> || || Public-key certificate||||<(> || || Realm||||<(> || || Sequence number||||<(> || || Subkey||||<(> || || Ticket||||<(> || || Ticket-granting server (TGS)||||<(> || || X.509 Certificate||||<(> || == Review Questions == '''14.1 What problem was Kerberos designed to address?''' '''14.2 What are three threats associated with user authentication over a network or Internet?''' '''14.3 List three approaches to secure user authentication in a distribted environment.''' '''14.4 What four requirements were defined for Kerberos?''' '''14.5 What entities constitute a full-service Kerberos environment?''' '''14.6 In the context of Kerberos, what is a realm?''' '''14.7 What are the principal differences between version 4 and version 5 of Kerberos?''' '''14.8 What is the purpose of the X.509 standard?''' '''14.9 What is a chain of certificates?''' '''14.10 How is an X.509 certificate revoked?''' |
Kerberos
Terms
authentication |
|
|
authentication server |
|
|
Kerberos |
|
|
Kerberos realm |
|
|
Propagating cipher block chaining (PCBC) mode |
|
|
Public-key certificate |
|
|
Realm |
|
|
Sequence number |
|
|
Subkey |
|
|
Ticket |
|
|
Ticket-granting server (TGS) |
|
|
X.509 Certificate |
|
Review Questions
14.1 What problem was Kerberos designed to address?
14.2 What are three threats associated with user authentication over a network or Internet?
14.3 List three approaches to secure user authentication in a distribted environment.
14.4 What four requirements were defined for Kerberos?
14.5 What entities constitute a full-service Kerberos environment?
14.6 In the context of Kerberos, what is a realm?
14.7 What are the principal differences between version 4 and version 5 of Kerberos?
14.8 What is the purpose of the X.509 standard?
14.9 What is a chain of certificates?
14.10 How is an X.509 certificate revoked?