From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Alternate user authentication requirements

Alternate user authentication requirements - Linux Tutorial

From the course: Linux Hardening

Alternate user authentication requirements

Welcome back to Cybrary's Linux Hardening course. In this lesson, we cover alternate means of user authentication. I'm your instructor, Corey Holzer. Now let's get started. This lesson has two objectives. First, we will look at the tool called Kerberos and see where it's utilized. Second, we will discuss private key pairs and where they're employed. Kerberos is implemented in numerous operating systems, not just Linux. It is the go-to protocol for single sign-on applications, and it is a trusted third-party for client server applications for verifying user identities. On this slide, you see what the Kerberos transaction looks like and I'm going to walk you through it. A Kerberos transaction begins with the client requesting an authentication ticket or TGT from the key distribution center. The key distribution center, or KDC, verifies the credentials and generates a ticket-granting ticket, and it is encrypted by the ticket-granting service. After this, the client stores the ticket for…

Contents