25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13.3.3 DCE threads<br />

are then decrypted by the security server using its own copy of the password<br />

stored in the registry database.<br />

If the security server is not able to authenticate the client for some reason, such<br />

as the entering an invalid password, an error is returned <strong>and</strong> the logon is<br />

terminated. However, if the exchange completes with the client being<br />

successfully authenticated, the security server returns credentials that are then<br />

used by the client to establish sessions with other DCE servers, such as<br />

resource <strong>and</strong> directory servers. These credentials contain information in the form<br />

of a privilege ticket granting ticket (PTGT) <strong>and</strong> extended privilege attribute<br />

certificate (EPAC):<br />

EPAC This is a validated list supplied by the security server<br />

containing the client's name, groups the client belongs to, <strong>and</strong><br />

the extended registry attributes for the authenticated client (if<br />

any were defined <strong>and</strong> associated with their account). A client<br />

must present its EPAC (acquired during third-party<br />

authentication) to any server the client wants to connect to in<br />

order to access its resources.<br />

PTGTA PTGT is a privilege ticket granting ticket. It contains the EPAC,<br />

which has all the relevant information about a user (UUID,<br />

group membership, ERAs, <strong>and</strong> so on). The PTGT is what is<br />

actually passed from a DCE client to a DCE server when it<br />

needs to access resources.<br />

Public key support<br />

The latest version of DCE (DCE Version 1.2.2) introduces the option of using<br />

public key technology (such as that from RSA or smart cards) to support the login<br />

process. Using this technology, the long-term key (or password) for a user (or<br />

other DCE object) does not need to be stored at the security server, providing<br />

enhanced security in the event of a compromise of the security server.<br />

Administrators can specify that some principals can use the pre-DCE 1.2<br />

mechanisms while others have access to the public key mechanism. DCE_1.2.2<br />

retains full interoperability with previous DCE releases. During the login process,<br />

public key users receive credentials that allow them to use the current<br />

(Kerberos-based) DCE authentication mechanism. A new pre-authentication<br />

protocol is used. The login client does not have to determine whether a given<br />

user is public key-capable prior to requesting credentials.<br />

Traditional applications (written in languages such as C, COBOL, <strong>and</strong> so on)<br />

have many lines of programming code that usually execute in a sequential<br />

manner. At any time, there is one point in the program that is executing. This can<br />

Chapter 13. Remote execution <strong>and</strong> distributed computing 505

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!