Kerberos: Remote Authentification Software

965 Words Feb 17th, 2018 4 Pages
In order to fully secure networked servers and hosts, things like biometrics and synchronized password generators are slow to be adapted and require some physiological characteristic in order to function properly. These automated methods of authentication are based on physical verifiers like iris pattern, fingerprinting, keystrokes are signature recognition tackle physical security appropriately but when it comes to securing the intangible there is authentication software available for protecting your secure authentication servers and hosts. One such software developed by MIT, is available in both public domain and commercial version, is named Kerberos; this software has become the standard for remote authentication.
Essentially Kerberos is a trusted third party authentication service, clients and servers rely on Kerberos to me facilitate their mutual authentications, requiring that users to prove their identity for each service as well as requiring servers to prove their identity to users. This instance based authentication ensures that only authorized users may access authorized servers, this tight knit handshake of authentication is complex and shows the fact that there are many ways for attackers to penetrate security so Kerberos attempts to accommodate these vulnerabilities. To counter the threats,…
Open Document