Kerberos: The Definitive Guide : The Definitive Guide 🔍
Garman, Jason.
O'Reilly Media, Incorporated, Sebastopol, 2010
英语 [en] · EPUB · 1.8MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
Table of Contents
Preface
Organization of This Book
Conventions Used in This Book
Comments and Questions
Thanks ...
Chapter 1. Introduction
Origins
Modern History
The time-sharing model
The client-server model
Project Athena
What Is Kerberos?
Goals
Evolution
Early Kerberos (v1, v2, v3)
Kerberos 4
Kerberos 5
New Directions
Other Products
DCE
Globus Security Infrastructure
SESAME
Chapter 2. Pieces of the Puzzle
The Three As
Authentication
Authorization
Auditing
Directories
Privacy and Integrity
Encryption
Message Integrity
Kerberos Terminology and Concepts. Realms, Principals, and InstancesService and host principals
Kerberos 4 principals
Kerberos 5 principals
Keys, Salts, and Passwords
The Key Distribution Center
The Authentication Server
The Ticket Granting Server
Tickets
The ticket (or credential) cache
Putting the Pieces Together
Chapter 3. Protocols
The Needham-Schroeder Protocol
Kerberos 4
The Authentication Server and the Ticket Granting Server
String-to-Key Transformation
The Key Version Number
Password Changing
Kerberos 5
The World's Shortest ASN. 1 Tutorial
The Authentication Server and the Ticket Granting Server. New Encryption OptionsTicket Options
Kerberos 5-to-4 Ticket Translation
Pre-Authentication
Other Protocol Features and Extensions
String-to-Key Transformation
Password Changing
The Alphabet Soup of Kerberos-Related Protocols
The Generic Security Services API (GSSAPI)
The Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO)
Chapter 4. Implementation
The Basic Steps
Planning Your Installation
Choose the Platform and Operating System
Choose a KDC Package
MIT
Heimdal
Windows domain controllers
Before You Begin
KDC Installation
MIT
Building the distribution. Creating your realmStarting the servers
A quick test
Adding slave KDCs
Heimdal
Building the distribution
Creating your realm
Starting the servers
A quick test
Adding slave KDCs
Windows Domain Controller
Creating your realm
DNS and Kerberos
Setting Up KDC Discovery Over DNS
DNS Domain Name-to-Realm Mapping
Client and Application Server Installation
Unix as a Kerberos Client
Mac OS X as a Kerberos Client
Windows as a Kerberos Client
Chapter 5. Troubleshooting
A Quick Decision Tree
Debugging Tools
Errors and Solutions
Errors Obtaining an Initial Ticket. Unsynchronized ClocksIncorrect or Missing Kerberos Configuration
Server Hostname Misconfiguration
Encryption Type Mismatches
Chapter 6. Security
Kerberos Attacks
Other Attacks
Protocol Security Issues
Dictionary and Brute-Force Attacks
Replay Attacks
Man-in-the-Middle Attacks
Security Solutions
Requiring Pre-Authentication
MIT
Heimdal
Windows domain controllers
Enforcing Secure Passwords
Heimdal
MIT
Windows domain controllers
Enforcing Password Lifetimes and History
MIT
Heimdal
Windows domain controllers
Protecting Your KDC
Protecting a Unix KDC.
Preface
Organization of This Book
Conventions Used in This Book
Comments and Questions
Thanks ...
Chapter 1. Introduction
Origins
Modern History
The time-sharing model
The client-server model
Project Athena
What Is Kerberos?
Goals
Evolution
Early Kerberos (v1, v2, v3)
Kerberos 4
Kerberos 5
New Directions
Other Products
DCE
Globus Security Infrastructure
SESAME
Chapter 2. Pieces of the Puzzle
The Three As
Authentication
Authorization
Auditing
Directories
Privacy and Integrity
Encryption
Message Integrity
Kerberos Terminology and Concepts. Realms, Principals, and InstancesService and host principals
Kerberos 4 principals
Kerberos 5 principals
Keys, Salts, and Passwords
The Key Distribution Center
The Authentication Server
The Ticket Granting Server
Tickets
The ticket (or credential) cache
Putting the Pieces Together
Chapter 3. Protocols
The Needham-Schroeder Protocol
Kerberos 4
The Authentication Server and the Ticket Granting Server
String-to-Key Transformation
The Key Version Number
Password Changing
Kerberos 5
The World's Shortest ASN. 1 Tutorial
The Authentication Server and the Ticket Granting Server. New Encryption OptionsTicket Options
Kerberos 5-to-4 Ticket Translation
Pre-Authentication
Other Protocol Features and Extensions
String-to-Key Transformation
Password Changing
The Alphabet Soup of Kerberos-Related Protocols
The Generic Security Services API (GSSAPI)
The Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO)
Chapter 4. Implementation
The Basic Steps
Planning Your Installation
Choose the Platform and Operating System
Choose a KDC Package
MIT
Heimdal
Windows domain controllers
Before You Begin
KDC Installation
MIT
Building the distribution. Creating your realmStarting the servers
A quick test
Adding slave KDCs
Heimdal
Building the distribution
Creating your realm
Starting the servers
A quick test
Adding slave KDCs
Windows Domain Controller
Creating your realm
DNS and Kerberos
Setting Up KDC Discovery Over DNS
DNS Domain Name-to-Realm Mapping
Client and Application Server Installation
Unix as a Kerberos Client
Mac OS X as a Kerberos Client
Windows as a Kerberos Client
Chapter 5. Troubleshooting
A Quick Decision Tree
Debugging Tools
Errors and Solutions
Errors Obtaining an Initial Ticket. Unsynchronized ClocksIncorrect or Missing Kerberos Configuration
Server Hostname Misconfiguration
Encryption Type Mismatches
Chapter 6. Security
Kerberos Attacks
Other Attacks
Protocol Security Issues
Dictionary and Brute-Force Attacks
Replay Attacks
Man-in-the-Middle Attacks
Security Solutions
Requiring Pre-Authentication
MIT
Heimdal
Windows domain controllers
Enforcing Secure Passwords
Heimdal
MIT
Windows domain controllers
Enforcing Password Lifetimes and History
MIT
Heimdal
Windows domain controllers
Protecting Your KDC
Protecting a Unix KDC.
备用文件名
upload/bibliotik/0_Other/2/2003 Jason Garman-Kerberos.epub
备用文件名
lgli/Z:\Bibliotik_\15\2\2003 Jason Garman-Kerberos.epub
备用文件名
lgrsnf/Z:\Bibliotik_\15\2\2003 Jason Garman-Kerberos.epub
备用文件名
nexusstc/Kerberos: the Definitive Guide/35c52c5017ea89a0b8c13626d9da7096.epub
备用文件名
zlib/no-category/Garman, Jason/Kerberos: the Definitive Guide_5696309.epub
备选作者
Jason Garman
备用出版商
Pogue Press
备用版本
1st Edition, Beijing, Farnham, China, 2003
备用版本
United States, United States of America
备用版本
O'Reilly Media, Beijing, 2003
备用版本
1st ed, Sebastopol, CA, ©2003
备用版本
August 26, 2003
备用版本
1, 20030826
备用版本
PT, 2003
元数据中的注释
lg2625404
元数据中的注释
{"isbns":["0596004036","1449390773","9780596004033","9781449390778"],"publisher":"O'Reilly Media"}
元数据中的注释
"Covers Unix and Windows"--Cover.
"Cross-platform authentication & single-sign-on"--Cover.
Includes index.
"Cross-platform authentication & single-sign-on"--Cover.
Includes index.
备用描述
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems. -- [Amazon]
备用描述
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
备用描述
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by pr.;Table of Contents; Preface; Organization of This Book; Conventions Used in This Book; Comments and Questions; Thanks ... ; Chapter 1. Introduction; Origins; Modern History; The time-sharing model; The client-server model; Project Athena; What Is Kerberos?; Goals; Evolution; Early Kerberos (v1, v2, v3); Kerberos 4; Kerberos 5; New Directions; Other Products; DCE; Globus Security Infrastructure; SESAME; Chapter 2. Pieces of the Puzzle; The Three As; Authentication; Authorization; Auditing; Directories; Privacy and Integrity; Encryption; Message Integrity; Kerberos Terminology and Concepts.
备用描述
Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos: The Definitive Guide shows you how to implement Kerberos on Windows and Unix systems for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.
COMPUTERS / Security / General
COMPUTERS / Security / General
开源日期
2020-07-26
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.