• Complain

Jason Garman - Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]

Here you can read online Jason Garman - Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows] full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Beijing, year: 2006, publisher: OReilly, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jason Garman Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]
  • Book:
    Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]
  • Author:
  • Publisher:
    OReilly
  • Genre:
  • Year:
    2006
  • City:
    Beijing
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Jason Garman: author's other books


Who wrote Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]? Find out the surname, the name of the author of the book and a list of all author's works by series.

Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows] — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Reviews Reader Reviews Errata Kerberos The Definitive Guide By - photo 1
Reviews
Reader Reviews
Errata
Kerberos: The Definitive Guide
By Jason Garman
Publisher: O'Reilly
Pub Date: August 2003
ISBN: 0-596-00403-6
Pages: 272

Single sign-on is the holy grail of network administration,and Kerberos is the only game in town. Microsoft, byintegrating Kerberos into Active Directory in Windows 2000and 2003, has extended the reach of Kerberos to all networkslarge or small. Kerberos: The DefinitiveGuide shows you how to implement Kerberos onWindows and Unix systems for secure authentication. Inaddition to covering the basic principles behindcryptographic authentication, it covers everything frombasic installation to advanced topics like cross-realmauthentication, defending against attacks on Kerberos, andtroubleshooting.

Dedication

Dedicated in loving memory to my grandfather, Harry Stumpff.

Jason Garman

Copyright

Copyright 2003 O'Reilly & Associates, Inc.

Printed in the United States of America.

Published by O'Reilly & Associates, Inc., 1005 GravensteinHighway North, Sebastopol, CA 95472.

O'Reilly & Associates books may be purchased for educational,business, or sales promotional use. Online editions are also availablefor most titles (.

Nutshell Handbook, the Nutshell Handbook logo, and the O'Reillylogo are registered trademarks of O'Reilly & Associates, Inc. Many ofthe designations used by manufacturers and sellers to distinguishtheir products are claimed as trademarks. Where those designationsappear in this book, and O'Reilly & Associates, Inc. was aware of atrademark claim, the designations have been printed in caps or initialcaps. The association between the image of a barred owl and the topic of Kerberos isa trademark of O'Reilly & Associates, Inc.

While every precaution has been taken in the preparation of thisbook, the publisher and author assume no responsibility for errors oromissions, or for damages resulting from the use of the informationcontained herein.

Preface

Kerberos is asophisticated network authentication systemone that has beenpublicly available since 1989 and provides that eternal holy grail ofnetwork administrators, single-sign-on. Yet, in that interveningdecade, documentation on Kerberos has been notably lacking. Whilemany large organizations and academic institutions have enjoyed thebenefits of using Kerberos in their networks, the deployment ofKerberos in smaller networks has been severely hampered by a lack ofdocumentation.

I decided to write this book precisely because of this lack of usefuldocumentation. My own experiences with Kerberos are those of extremefrustration as I attempted to decipher the documentation. I foundthat I had to keep copious notes to keep everything straight. Thosenotes eventually became the outline of this book.

Today, Microsoft, through its adoption of the latest Kerberosprotocol as the preferred authentication mechanism in its ActiveDirectory, has single-handedly driven the use of Kerberos into themajority of the operating-system market that it controls. Thanks tothe openness of Kerberos, organizations now can establishcross-platform, single sign-on network environments, giving anend-user one set of credentials that will provide him access to allnetwork resources, regardless of platform or operating system. Yetthe workings and benefits of Kerberos remain a mystery to mostnetwork administrators. This book aims to pull away the curtain andreveal the magician working behind the scenes.

This book is geared toward the system administrator who wants toestablish a single sign-on network using Kerberos. This book is alsouseful for anyone interested in how Kerberos performs its magic: thefirst three chapters will be most helpful to these people.

Organization of This Book

Here's a breakdown of how this book is organized:

Provides a gentle introduction to Kerberos, and provides an overviewof its history and features. It provides a gentle prologue bybringing you from the reasons for the development of Kerberos at MITthrough to the latest versions of the protocol.

Continues where left off, presenting anintroduction to the concepts and terminology that permeate the useand administration of Kerberos. The knowledge of these concepts isessential to the understanding of how Kerberos works as well as howto use and administer it.

Speaking of how Kerberos works, provides a detailed yet easy-to-followdescription of how the Kerberos protocol works and describes thenumerous encrypted messages that are sent back and forth.

Takes you from the realm of the theoretical and conceptual into thepractical aspects involved in administering a Kerberos system. Here,the Kerberos implementations that will be discussed throughout thebook are introduced, and the basics of the installation andadministration of a Kerberos authentication system are described.

When things go wrong with your Kerberos implementation, provides a methodology for diagnosingKerberos-related problems and demonstrates some of the more commonerrors that can occur.

Provides a detailed look at the practical security concerns relatedto running Kerberos.

Reviews some common software that can be configured to use Kerberosauthentication.

Provides information about more advanced topics in running a Kerberosauthentication system, including how to interoperate between Unix andWindows Kerberos implementations. This chapter also reviews howmultiple Kerberos realms can cooperate and share resources throughcross-realm authentication.

Presents a sample case study that demonstrates the implementationtasks presented earlier in a practical example.

Finishes off the book with a description of the future directionsKerberos is taking. We'll examine new protocolenhancements that will enable Kerberos to take advantage of newsecurity and encryption technologies.

Provides an in-depth reference on the various commands avialable toKerberos administrators.

Conventions Used in This Book

The following conventions are used in this book.

Italic

Used for file and directory names and for URLs. It is also used toemphasize new terms and concepts when they are introduced.

Constant Width

Used for code examples, commands, options, variables, and parameters.

Constant Width Italic

Indicates a replaceable term in code.

Picture 2

Indicates a tip, suggestion, or general note.

Picture 3

Indicates a warning.

Comments and Questions

We have tested and verified all of the information in this book tothe best of our ability, but you may find that features have changed,that typos have crept in, or that we have made a mistake. Please letus know about what you find, as well as your suggestions for futureeditions, by contacting:

O'Reilly & Associates, Inc.1005 Gravenstein Highway NorthSebastopol, CA 95472(800)998-9938 (in the U.S. or Canada)(707)829-0515 (international/local)(707)829-0104 (fax)
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]»

Look at similar books to Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows]»

Discussion, reviews of the book Kerberos : the definitive guide ; [cross-platform authentication & single-sign-on ; covers Unix and Windows] and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.