Kerberos: The Definitive Guide Kerberos: The Definitive Guide

Kerberos: The Definitive Guide

The Definitive Guide

    • 43,99 €
    • 43,99 €

Publisher Description

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.

GENRE
Computing & Internet
RELEASED
2003
26 August
LANGUAGE
EN
English
LENGTH
274
Pages
PUBLISHER
O'Reilly Media
SIZE
3.9
MB

More Books Like This

On the origin of three-headed dog and how to tame it in today's environment On the origin of three-headed dog and how to tame it in today's environment
2014
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
Microsoft Windows Security Essentials Microsoft Windows Security Essentials
2011
System z Crypto and TKE Update System z Crypto and TKE Update
2011
This Week: Hardening Junos Devices, 2nd Edition This Week: Hardening Junos Devices, 2nd Edition
2015
Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch
2012