25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

usiness partner's <strong>and</strong> supplier's VPN solutions. Perhaps equally critical is the<br />

ability to work with a vendor that underst<strong>and</strong>s the issues of deploying a VPN. The<br />

implementation of a successful VPN involves more than technology. The<br />

vendor's networking experience plays heavily into this equation.<br />

22.11 Kerberos authentication <strong>and</strong> authorization system<br />

The Kerberos Network Authentication Service Version 5 is a proposed st<strong>and</strong>ard<br />

protocol. Its status is elective <strong>and</strong> described in RFC 1510.<br />

According to The Enlarged Devil's Dictionary, by Ambrose Bierce, Kerberos is<br />

“the watchdog of Hades, whose duty it was to guard the entrance against whom<br />

or what does not clearly appear; Kerberos is known to have had three heads.”<br />

A Kerberos service is normally run on its own system in a secure area. Users<br />

have to validate themselves to Kerberos before they are allowed to connect to<br />

other servers in the network. The server’s identities can also be checked against<br />

Kerberos.<br />

The Kerberos Authentication <strong>and</strong> Authorization System is an encryption-based<br />

security system that provides mutual authentication between the users <strong>and</strong> the<br />

servers in a network environment. The assumed goals for this system are:<br />

► Authentication to prevent fraudulent requests/responses between users <strong>and</strong><br />

servers that must be confidential <strong>and</strong> between groups of at least one user <strong>and</strong><br />

one service.<br />

► Authorization can be implemented independently from the authentication by<br />

each service that wants to provide its own authorization system. The<br />

authorization system can assume that the authentication of a user/client is<br />

reliable.<br />

► Permits the implementation of an accounting system that is integrated,<br />

secure, <strong>and</strong> reliable, with modular attachment <strong>and</strong> support for “chargebacks”<br />

or billing purposes.<br />

The Kerberos system is mainly used for authentication purposes, but it also<br />

provides the flexibility to add authorization information.<br />

864 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!