2 cissp ® Official Study Guide Eighth Edition


Chapter 13  ■ Managing Identity and Authentication Ticket-Granting Ticket



Download 19,3 Mb.
Pdf ko'rish
bet567/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   563   564   565   566   567   568   569   570   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

604
Chapter 13 

Managing Identity and Authentication
Ticket-Granting Ticket
A ticket-granting ticket (TGT) provides proof that a subject has 
authenticated through a KDC and is authorized to request tickets to access other objects. 
A TGT is encrypted and includes a symmetric key, an expiration time, and the user’s IP 
address. Subjects present the TGT when requesting tickets to access objects. 
Ticket
A ticket is an encrypted message that provides proof that a subject is authorized 
to access an object. It is sometimes called a service ticket (ST). Subjects request tickets 
to access objects, and if they have authenticated and are authorized to access the object, 
Kerberos issues them a ticket. Kerberos tickets have specifi c lifetimes and usage parameters. 
Once a ticket expires, a client must request a renewal or a new ticket to continue communi-
cations with any server. 
Kerberos requires a database of accounts, which is often contained in a directory ser-
vice. It uses an exchange of tickets between clients, network servers, and the KDC to prove 
identity and provide authentication. This allows a client to request resources from the 
server with both the client and server having assurances of the identity of the other. These 
encrypted tickets also ensure that logon credentials, session keys, and authentication mes-
sages are never transmitted in clear text. 
The Kerberos logon process works as follows: 
1.
The user types a username and password into the client. 
2.
The client encrypts the username with AES for transmission to the KDC. 
3.
The KDC verifies the username against a database of known credentials. 
4.
The KDC generates a symmetric key that will be used by the client and the Kerberos 
server. It encrypts this with a hash of the user’s password. The KDC also generates an 
encrypted time-stamped TGT. 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   563   564   565   566   567   568   569   570   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish