Skip to content

Kerberos: the Definitive Guide The Definitive Guide

Best in textbook rentals since 2012!

ISBN-10: 0596004036

ISBN-13: 9780596004033

Edition: 2003

Authors: Jason Garman

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one…    
Customers also bought

Book details

List price: $49.99
Copyright year: 2003
Publisher: O'Reilly Media, Incorporated
Publication date: 9/16/2003
Binding: Paperback
Pages: 270
Size: 7.01" wide x 9.13" long x 0.71" tall
Weight: 0.990
Language: English

Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems.

Preface
Introduction Origins What Is Kerberos? Goals Evolution Other Products
Pieces of the Puzzle The Three As Directories Privacy and Integrity Kerberos Terminology and Concepts Putting the Pieces Together
Protocols The Needham-Schroeder Protocol Kerberos 4 Kerberos 5 The Alphabet Soup of Kerberos-Related Protocols
Implementation The Basic Steps Planning Your Installation Before You Begin KDC Installation DNS and Kerberos Client and Application Server Installation
Troubleshooting A Quick Decision Tree Debugging Tools Errors and Solutions
Security Kerberos Attacks Protocol Security Issues Security Solutions Protecting Your KDC Firewalls, NAT, and Kerberos Auditing
Applications What Does Kerberos Support Mean? Services and Keytabs Transparent Kerberos Login with PAM Mac OS X and the Login Window Kerberos and Web-Based Applications The Simple Authentication and Security Layer (SASL) Kerberos-Enabled Server Packages Kerberos-Enabled Client Packages More Kerberos-Enabled Packages
Advanced Topics Cross-Realm Authentication Using Kerberos 4 Services with Kerberos 5 Windows Issues Windows and Unix Interoperability
Case Study The Organization Planning Implementation
Kerberos Futures Public Key Extensions Smart Cards Better Encryption Kerberos Referrals Web Services
Appendix: Administration
Reference
Index