Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Kerberos (protocol)

Index Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. [1]

187 relations: Abstract Syntax Notation One, Access token, Active Directory, Alfresco (software), Amadeus Cho, Andrew File System, Apache Directory, Apache Hive, Apache Impala, Apple Filing Protocol, Apple Open Directory, AppleTalk, ArcaOS, Authentication, Authentication Open Service Interface Definition, Authentication protocol, Authentication server, Authorization, Authorization certificate, Barry Appelman, Beonex Communicator, BitLocker, Block cipher mode of operation, Burrows–Abadi–Needham logic, Cain and Abel (software), Camellia (cipher), Central Authentication Service, Certificate authority, Certificate revocation list, Challenge–response authentication, Comparison of instant messaging protocols, Comparison of Java and C++, Comparison of mail servers, Comparison of OLAP Servers, Comparison of SSH clients, Comparison of TLS implementations, Computational trust, Cryptographic protocol, Cryptography standards, CURL, Data grid, Data Transformation Services, Digest access authentication, Directory service, Distributed Computing Environment, Dynamic DNS, Embrace, extend, and extinguish, Foreman (software), Free software, FreeIPA, ..., FSF Free Software Awards, Galina Kofman, Generic Security Service Algorithm for Secret Key Transaction, Generic Security Services Application Program Interface, Glossary of cryptographic keys, Heimdal (disambiguation), Hesiod (name service), HOB GmbH & Co KG, HP-UX, IBM Enterprise Identity Mapping, IBM Tivoli Directory Server, IEEE 802.1AE, Index of cryptography articles, Index of Internet-related articles, Information Card, Information security, Integrated Windows Authentication, Intel Active Management Technology, Intel AMT versions, Intel vPro, Internet Download Manager, Jerry Saltzer, John the Ripper, K5, Kerberized Internet Negotiation of Keys, Kerberos, Key authentication, Key distribution center, Keycloak, LAN Manager, LibreSSL, Lightweight Directory Access Protocol, List of computer term etymologies, List of features removed in Windows Vista, List of file systems, List of free and open-source software packages, List of important publications in cryptography, List of JBoss software, List of Microsoft Windows components, List of RFCs, List of TCP and UDP port numbers, Live Communications Server 2005, Logical security, Lsh, Lustre (file system), Mac OS X Snow Leopard, MacOS Server, Microsoft DNS, Microsoft Office, Microsoft Office 2003, Microsoft Open Specification Promise, Microsoft Windows version history, Needham–Schroeder protocol, Netatalk, NetBSD, Network File System, Network Information Service, Network Time Protocol, Neuman–Stubblebine protocol, Nextcloud, Nirvana (software), NT LAN Manager, NTLMSSP, OCSP stapling, Openfiler, OpenLDAP, OpenSSH, Opportunistic encryption, OrientDB, OS 2200, Otway–Rees protocol, Outline of computer security, Pass the hash, Passwd, Password, Password Authenticated Key Exchange by Juggling, PERMIS, Pluggable authentication module, Post Office Protocol, Post-quantum cryptography, PostgreSQL, Privilege (computing), Project Athena, Proprietary protocol, RADIUS, RC4, Realm (disambiguation), Replay attack, Roger Needham, Samba (software), Seam, Secure Remote Password protocol, Secure Shell, Security and safety features new to Windows Vista, Security domain, Security protocol notation, Security Support Provider Interface, Server Message Block, Shared secret, Simeon (email client), Simple Authentication and Security Layer, Simple Protocol for Independent Computing Environments, Single sign-on, Solaris (operating system), SPN, SPNEGO, SRV record, TACACS, Theodore Ts'o, Ticket (IT security), Ticket Granting Ticket, TkWWW, TLS-PSK, Transport Layer Security, TSIG, Univention Corporate Server, USC Viterbi School of Engineering, User Account Control, VisualSVN Server, Web Services Security Kerberos Binding, Wide Mouth Frog protocol, Windows 2000, Windows Firewall, Windows Server 2008, Windows Services for UNIX, WinSCP, Wireless grid, WLAN Authentication and Privacy Infrastructure, WolfSSL, Woo–Lam, WS-Security, X Window authorization, X.690, Yahalom (protocol), Zephyr (protocol), Zeroshell, 56-bit encryption. Expand index (137 more) »

Abstract Syntax Notation One

Abstract Syntax Notation One (ASN.1) is an interface description language for defining data structures that can be serialized and deserialized in a standard, cross-platform way.

New!!: Kerberos (protocol) and Abstract Syntax Notation One · See more »

Access token

In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's privileges, and, in some cases, a particular application.

New!!: Kerberos (protocol) and Access token · See more »

Active Directory

Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks.

New!!: Kerberos (protocol) and Active Directory · See more »

Alfresco (software)

Alfresco is a collection of information management software products for Microsoft Windows and Unix-like operating systems developed using Java technology.

New!!: Kerberos (protocol) and Alfresco (software) · See more »

Amadeus Cho

Amadeus Cho, also known as Mastermind Excello, Prince of Power, Iron Spider, Spider-Man, and The Hulk as of 2015, is a fictional superhero appearing in American comic books published by Marvel Comics.

New!!: Kerberos (protocol) and Amadeus Cho · See more »

Andrew File System

The Andrew File System (AFS) is a distributed file system which uses a set of trusted servers to present a homogeneous, location-transparent file name space to all the client workstations.

New!!: Kerberos (protocol) and Andrew File System · See more »

Apache Directory

Apache Directory is an open source project of the Apache Software Foundation.

New!!: Kerberos (protocol) and Apache Directory · See more »

Apache Hive

Apache Hive is a data warehouse software project built on top of Apache Hadoop for providing data summarization, query and analysis.

New!!: Kerberos (protocol) and Apache Hive · See more »

Apache Impala

Apache Impala is an open source massively parallel processing (MPP) SQL query engine for data stored in a computer cluster running Apache Hadoop.

New!!: Kerberos (protocol) and Apache Impala · See more »

Apple Filing Protocol

The Apple Filing Protocol (AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS.

New!!: Kerberos (protocol) and Apple Filing Protocol · See more »

Apple Open Directory

Apple Open Directory is the LDAP directory service model implementation from Apple Inc. A directory service is software which stores and organizes information about a computer network's users and network resources and which allows network administrators to manage users' access to the resources.

New!!: Kerberos (protocol) and Apple Open Directory · See more »

AppleTalk

AppleTalk was a proprietary suite of networking protocols developed by Apple Inc. for their Macintosh computers.

New!!: Kerberos (protocol) and AppleTalk · See more »

ArcaOS

ArcaOS is an operating system developed and marketed by Arca Noae, LLC derived from OS/2, based on the last release by IBM.

New!!: Kerberos (protocol) and ArcaOS · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Kerberos (protocol) and Authentication · See more »

Authentication Open Service Interface Definition

The Authentication Open Service Interface Definition (OSID) is an O.K.I. specification which supports invoking an authentication process.

New!!: Kerberos (protocol) and Authentication Open Service Interface Definition · See more »

Authentication protocol

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities.

New!!: Kerberos (protocol) and Authentication protocol · See more »

Authentication server

An authentication server provides a network service that applications use to authenticate the credentials, usually account names and passwords, of their users.

New!!: Kerberos (protocol) and Authentication server · See more »

Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Kerberos (protocol) and Authorization · See more »

Authorization certificate

In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the holder by the issuer.

New!!: Kerberos (protocol) and Authorization certificate · See more »

Barry Appelman

Barry Appelman is recognized as being the father of the "buddy list" and AOL instant messenger.

New!!: Kerberos (protocol) and Barry Appelman · See more »

Beonex Communicator

Beonex Communicator is a discontinued open-source Internet suite based on the Mozilla Application Suite (MAS) by Ben Bucksch, a German Mozilla developer.

New!!: Kerberos (protocol) and Beonex Communicator · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: Kerberos (protocol) and BitLocker · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: Kerberos (protocol) and Block cipher mode of operation · See more »

Burrows–Abadi–Needham logic

Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols.

New!!: Kerberos (protocol) and Burrows–Abadi–Needham logic · See more »

Cain and Abel (software)

Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows.

New!!: Kerberos (protocol) and Cain and Abel (software) · See more »

Camellia (cipher)

In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits.

New!!: Kerberos (protocol) and Camellia (cipher) · See more »

Central Authentication Service

The Central Authentication Service (CAS) is a single sign-on protocol for the web.

New!!: Kerberos (protocol) and Central Authentication Service · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: Kerberos (protocol) and Certificate authority · See more »

Certificate revocation list

A certificate revocation list (or CRL) is "a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted.".

New!!: Kerberos (protocol) and Certificate revocation list · See more »

Challenge–response authentication

In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

New!!: Kerberos (protocol) and Challenge–response authentication · See more »

Comparison of instant messaging protocols

The following is a comparison of instant messaging protocols.

New!!: Kerberos (protocol) and Comparison of instant messaging protocols · See more »

Comparison of Java and C++

This is a comparison of Java and C++, two prominent object-oriented programming languages.

New!!: Kerberos (protocol) and Comparison of Java and C++ · See more »

Comparison of mail servers

This is a comparison of mail servers: mail transfer agents, mail delivery agents, and other computer software that provide e-mail services.

New!!: Kerberos (protocol) and Comparison of mail servers · See more »

Comparison of OLAP Servers

The following tables compare general and technical information for a number of online analytical processing (OLAP) servers.

New!!: Kerberos (protocol) and Comparison of OLAP Servers · See more »

Comparison of SSH clients

An SSH client is a software program which uses the secure shell protocol to connect to a remote computer.

New!!: Kerberos (protocol) and Comparison of SSH clients · See more »

Comparison of TLS implementations

The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks.

New!!: Kerberos (protocol) and Comparison of TLS implementations · See more »

Computational trust

In information security, computational trust is the generation of trusted authorities or user trust through cryptography.

New!!: Kerberos (protocol) and Computational trust · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

New!!: Kerberos (protocol) and Cryptographic protocol · See more »

Cryptography standards

There are a number of standards related to cryptography.

New!!: Kerberos (protocol) and Cryptography standards · See more »

CURL

cURL (/kɝl/ or /kə:l/) is a computer software project providing a library and command-line tool for transferring data using various protocols.

New!!: Kerberos (protocol) and CURL · See more »

Data grid

A data grid is an architecture or set of services that gives individuals or groups of users the ability to access, modify and transfer extremely large amounts of geographically distributed data for research purposes.

New!!: Kerberos (protocol) and Data grid · See more »

Data Transformation Services

Data Transformation Services, or DTS, is a set of objects and utilities to allow the automation of extract, transform and load operations to or from a database.

New!!: Kerberos (protocol) and Data Transformation Services · See more »

Digest access authentication

Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser.

New!!: Kerberos (protocol) and Digest access authentication · See more »

Directory service

In computing, directory service or name service maps the names of network resources to their respective network addresses.

New!!: Kerberos (protocol) and Directory service · See more »

Distributed Computing Environment

In computing, the Distributed Computing Environment (DCE) software system was developed in the early 1990s from the work of the Open Software Foundation (OSF), a consortium (founded in 1988) that included Apollo Computer (part of Hewlett-Packard from 1989), IBM, Digital Equipment Corporation, and others.

New!!: Kerberos (protocol) and Distributed Computing Environment · See more »

Dynamic DNS

Dynamic DNS (DDNS or DynDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.

New!!: Kerberos (protocol) and Dynamic DNS · See more »

Embrace, extend, and extinguish

"Embrace, extend, and extinguish", also known as "Embrace, extend, and exterminate", is a phrase that the U.S. Department of Justice found was used internally by Microsoft to describe its strategy for entering product categories involving widely used standards, extending those standards with proprietary capabilities, and then using those differences to strongly disadvantage its competitors.

New!!: Kerberos (protocol) and Embrace, extend, and extinguish · See more »

Foreman (software)

Foreman (also known as The Foreman) is an open source complete life cycle systems management tool for provisioning, configuring and monitoring of physical and virtual servers.

New!!: Kerberos (protocol) and Foreman (software) · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: Kerberos (protocol) and Free software · See more »

FreeIPA

FreeIPA is an Identity management system.

New!!: Kerberos (protocol) and FreeIPA · See more »

FSF Free Software Awards

Free Software Foundation (FSF) grants two annual awards.

New!!: Kerberos (protocol) and FSF Free Software Awards · See more »

Galina Kofman

Galina Kofman is a computer scientist and business executive.

New!!: Kerberos (protocol) and Galina Kofman · See more »

Generic Security Service Algorithm for Secret Key Transaction

GSS-TSIG (Generic Security Service Algorithm for Secret Key Transaction) is an extension to the TSIG DNS authentication protocol for secure key exchange.

New!!: Kerberos (protocol) and Generic Security Service Algorithm for Secret Key Transaction · See more »

Generic Security Services Application Program Interface

The Generic Security Service Application Program Interface (GSSAPI, also GSS-API) is an application programming interface for programs to access security services.

New!!: Kerberos (protocol) and Generic Security Services Application Program Interface · See more »

Glossary of cryptographic keys

This glossary lists types of keys as the term is used in cryptography, as opposed to door locks.

New!!: Kerberos (protocol) and Glossary of cryptographic keys · See more »

Heimdal (disambiguation)

Heimdal may refer to.

New!!: Kerberos (protocol) and Heimdal (disambiguation) · See more »

Hesiod (name service)

In computing, the Hesiod name service originated in Project Athena (1983–1991).

New!!: Kerberos (protocol) and Hesiod (name service) · See more »

HOB GmbH & Co KG

HOB GmbH & Co.

New!!: Kerberos (protocol) and HOB GmbH & Co KG · See more »

HP-UX

HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on UNIX System V (initially System III) and first released in 1984.

New!!: Kerberos (protocol) and HP-UX · See more »

IBM Enterprise Identity Mapping

IBM Enterprise Identity Mapping (EIM) is a framework from IBM that allows the mapping of different identities (user IDs) on various platforms, user repositories and applications to a single identity.

New!!: Kerberos (protocol) and IBM Enterprise Identity Mapping · See more »

IBM Tivoli Directory Server

IBM Security Directory Server, formerly known as IBM Directory Server and IBM Tivoli Directory Server, is an IBM implementation of the Lightweight Directory Access Protocol IBM Security Directory Server is an enterprise directory for corporate intranets and the Internet.

New!!: Kerberos (protocol) and IBM Tivoli Directory Server · See more »

IEEE 802.1AE

802.1AE is the IEEE MAC Security standard (also known as MACsec) which defines connectionless data confidentiality and integrity for media access independent protocols.

New!!: Kerberos (protocol) and IEEE 802.1AE · See more »

Index of cryptography articles

Articles related to cryptography include.

New!!: Kerberos (protocol) and Index of cryptography articles · See more »

Index of Internet-related articles

This page provides an index of articles thought to be Internet or Web related topics.

New!!: Kerberos (protocol) and Index of Internet-related articles · See more »

Information Card

Information cards are personal digital identities that people can use online, and the key component of an identity metasystem.

New!!: Kerberos (protocol) and Information Card · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Kerberos (protocol) and Information security · See more »

Integrated Windows Authentication

Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT-based operating systems.

New!!: Kerberos (protocol) and Integrated Windows Authentication · See more »

Intel Active Management Technology

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them.

New!!: Kerberos (protocol) and Intel Active Management Technology · See more »

Intel AMT versions

Intel Active Management Technology (AMT) is hardware-based technology built into PCs with Intel vPro technology.

New!!: Kerberos (protocol) and Intel AMT versions · See more »

Intel vPro

Intel vPro technology is an umbrella marketing term used by Intel for a large collection of computer hardware technologies, including Hyperthreading, Turbo Boost 3.0, VT-x, VT-d, Trusted Execution Technology (TXT), and Intel Active Management Technology (AMT).

New!!: Kerberos (protocol) and Intel vPro · See more »

Internet Download Manager

Internet Download Manager (also called IDM) is a shareware download manager.

New!!: Kerberos (protocol) and Internet Download Manager · See more »

Jerry Saltzer

Jerome Howard "Jerry" Saltzer (born October 9, 1939) is a computer scientist.

New!!: Kerberos (protocol) and Jerry Saltzer · See more »

John the Ripper

John the Ripper is a free password cracking software tool.

New!!: Kerberos (protocol) and John the Ripper · See more »

K5

K5, K05 or K-5 may be.

New!!: Kerberos (protocol) and K5 · See more »

Kerberized Internet Negotiation of Keys

Kerberized Internet Negotiation of Keys (KINK) is a protocol defined in RFC 4430 used to set up an IPsec security association (SA), similar to Internet Key Exchange (IKE), utilizing the Kerberos protocol to allow trusted third parties to handle authentication of peers and management of security policies in a centralized fashion.

New!!: Kerberos (protocol) and Kerberized Internet Negotiation of Keys · See more »

Kerberos

Kerberos may refer to.

New!!: Kerberos (protocol) and Kerberos · See more »

Key authentication

Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is talking to or trying to talk to.

New!!: Kerberos (protocol) and Key authentication · See more »

Key distribution center

In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys.

New!!: Kerberos (protocol) and Key distribution center · See more »

Keycloak

Keycloak is an open source software product to allow single sign-on with Identity Management and Access Management aimed at modern applications and services.

New!!: Kerberos (protocol) and Keycloak · See more »

LAN Manager

LAN Manager was a Network operating system (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation.

New!!: Kerberos (protocol) and LAN Manager · See more »

LibreSSL

LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.

New!!: Kerberos (protocol) and LibreSSL · See more »

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

New!!: Kerberos (protocol) and Lightweight Directory Access Protocol · See more »

List of computer term etymologies

This is a list of the origins of computer-related terms or terms used in the computing world (i.e., a list of computer term etymologies).

New!!: Kerberos (protocol) and List of computer term etymologies · See more »

List of features removed in Windows Vista

While Windows Vista contains many new features, a number of capabilities and certain programs that were a part of previous Windows versions up to Windows XP were removed or changed – some of which were later re-introduced in Windows 7.

New!!: Kerberos (protocol) and List of features removed in Windows Vista · See more »

List of file systems

The following lists identify, characterize, and link to more thorough information on computer file systems.

New!!: Kerberos (protocol) and List of file systems · See more »

List of free and open-source software packages

This is a list of free and open-source software packages, computer software licensed under free software licenses and open-source licenses.

New!!: Kerberos (protocol) and List of free and open-source software packages · See more »

List of important publications in cryptography

This is a list of important publications in cryptography, organized by field.

New!!: Kerberos (protocol) and List of important publications in cryptography · See more »

List of JBoss software

This is a list of articles for JBoss software, and projects from the JBoss Community and Red Hat.

New!!: Kerberos (protocol) and List of JBoss software · See more »

List of Microsoft Windows components

The following is a list of Microsoft Windows components.

New!!: Kerberos (protocol) and List of Microsoft Windows components · See more »

List of RFCs

This is a partial list of RFCs (request for comments memoranda).

New!!: Kerberos (protocol) and List of RFCs · See more »

List of TCP and UDP port numbers

This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.

New!!: Kerberos (protocol) and List of TCP and UDP port numbers · See more »

Live Communications Server 2005

Live Communications Server 2005 (LCS 2005), codenamed Vienna, is the second version of a SIP based instant messaging and presence server after Live Communications Server 2003.

New!!: Kerberos (protocol) and Live Communications Server 2005 · See more »

Logical security

Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.

New!!: Kerberos (protocol) and Logical security · See more »

Lsh

lsh is a free software implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project including both server and client programs.

New!!: Kerberos (protocol) and Lsh · See more »

Lustre (file system)

Lustre is a type of parallel distributed file system, generally used for large-scale cluster computing.

New!!: Kerberos (protocol) and Lustre (file system) · See more »

Mac OS X Snow Leopard

Mac OS X Snow Leopard (version 10.6) is the seventh major release of Mac OS X (now named macOS), Apple's desktop and server operating system for Macintosh computers.

New!!: Kerberos (protocol) and Mac OS X Snow Leopard · See more »

MacOS Server

macOS Server, formerly Mac OS X Server and OS X Server, is a separately sold operating system add-on which provides additional server programs along with management and administration tools for macOS.

New!!: Kerberos (protocol) and MacOS Server · See more »

Microsoft DNS

Microsoft DNS is the name given to the implementation of domain name system services provided in Microsoft Windows operating systems.

New!!: Kerberos (protocol) and Microsoft DNS · See more »

Microsoft Office

Microsoft Office is a family of client software, server software, and services developed by Microsoft.

New!!: Kerberos (protocol) and Microsoft Office · See more »

Microsoft Office 2003

Microsoft Office 2003 (codenamed Office 11) is an office suite developed and distributed by Microsoft for its Windows operating system.

New!!: Kerberos (protocol) and Microsoft Office 2003 · See more »

Microsoft Open Specification Promise

The Microsoft Open Specification Promise (or OSP) is a promise by Microsoft, published in September 2006, to not assert its patents, in certain conditions, against implementations of a certain list of specifications.

New!!: Kerberos (protocol) and Microsoft Open Specification Promise · See more »

Microsoft Windows version history

Microsoft Windows was announced by Bill Gates on November 10, 1983.

New!!: Kerberos (protocol) and Microsoft Windows version history · See more »

Needham–Schroeder protocol

The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.

New!!: Kerberos (protocol) and Needham–Schroeder protocol · See more »

Netatalk

Netatalk is a free, open-source implementation of the Apple Filing Protocol.

New!!: Kerberos (protocol) and Netatalk · See more »

NetBSD

NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Kerberos (protocol) and NetBSD · See more »

Network File System

Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed.

New!!: Kerberos (protocol) and Network File System · See more »

Network Information Service

The Network Information Service, or NIS (originally called Yellow Pages or YP), is a client–server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network.

New!!: Kerberos (protocol) and Network Information Service · See more »

Network Time Protocol

Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

New!!: Kerberos (protocol) and Network Time Protocol · See more »

Neuman–Stubblebine protocol

The Neuman–Stubblebine protocol is a computer network authentication protocol designed for use on insecure networks (e.g., the Internet).

New!!: Kerberos (protocol) and Neuman–Stubblebine protocol · See more »

Nextcloud

Nextcloud is a suite of client-server software for creating and using file hosting services.

New!!: Kerberos (protocol) and Nextcloud · See more »

Nirvana (software)

Nirvana is virtual object storage software developed and maintained by General Atomics.

New!!: Kerberos (protocol) and Nirvana (software) · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Kerberos (protocol) and NT LAN Manager · See more »

NTLMSSP

NTLMSSP (NT LAN Manager (NTLM) Security Support Provider) is a binary messaging protocol used by the Microsoft Security Support Provider Interface (SSPI) to facilitate NTLM challenge-response authentication and to negotiate integrity and confidentiality options.

New!!: Kerberos (protocol) and NTLMSSP · See more »

OCSP stapling

OCSP stapling, formally known as the TLS Certificate Status Request extension, is an alternative approach to the Online Certificate Status Protocol (OCSP) for checking the revocation status of X.509 digital certificates.

New!!: Kerberos (protocol) and OCSP stapling · See more »

Openfiler

Openfiler is an operating system that provides file-based network-attached storage and block-based storage area network.

New!!: Kerberos (protocol) and Openfiler · See more »

OpenLDAP

OpenLDAP is a free, open source implementation of the Lightweight Directory Access Protocol (LDAP) developed by the OpenLDAP Project.

New!!: Kerberos (protocol) and OpenLDAP · See more »

OpenSSH

OpenSSH (also known as OpenBSD Secure Shell) is a suite of security-related network-level utilities based on the Secure Shell (SSH) protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by providing secure tunneling capabilities.

New!!: Kerberos (protocol) and OpenSSH · See more »

Opportunistic encryption

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.

New!!: Kerberos (protocol) and Opportunistic encryption · See more »

OrientDB

OrientDB is an open source NoSQL database management system written in Java.

New!!: Kerberos (protocol) and OrientDB · See more »

OS 2200

OS 2200 is the operating system for the Unisys ClearPath Dorado family of mainframe systems.

New!!: Kerberos (protocol) and OS 2200 · See more »

Otway–Rees protocol

The Otway–Rees protocol is a computer network authentication protocol designed for use on insecure networks (e.g. the Internet).

New!!: Kerberos (protocol) and Otway–Rees protocol · See more »

Outline of computer security

The following outline is provided as an overview of and topical guide to computer security: Computer security – security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet.

New!!: Kerberos (protocol) and Outline of computer security · See more »

Pass the hash

In cryptanalysis and computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case.

New!!: Kerberos (protocol) and Pass the hash · See more »

Passwd

passwd is a tool on most Unix and Unix-like operating systems used to change a user's password.

New!!: Kerberos (protocol) and Passwd · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Kerberos (protocol) and Password · See more »

Password Authenticated Key Exchange by Juggling

The Password Authenticated Key Exchange by Juggling (or J-PAKE) is a password-authenticated key agreement protocol, proposed by Feng Hao and Peter Ryan.

New!!: Kerberos (protocol) and Password Authenticated Key Exchange by Juggling · See more »

PERMIS

PERMIS (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy-based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model.

New!!: Kerberos (protocol) and PERMIS · See more »

Pluggable authentication module

A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).

New!!: Kerberos (protocol) and Pluggable authentication module · See more »

Post Office Protocol

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a server in an Internet Protocol (IP) network.

New!!: Kerberos (protocol) and Post Office Protocol · See more »

Post-quantum cryptography

Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer.

New!!: Kerberos (protocol) and Post-quantum cryptography · See more »

PostgreSQL

PostgreSQL, often simply Postgres, is an object-relational database management system (ORDBMS) with an emphasis on extensibility and standards compliance.

New!!: Kerberos (protocol) and PostgreSQL · See more »

Privilege (computing)

In computing, privilege is defined as the delegation of authority over a computer system.

New!!: Kerberos (protocol) and Privilege (computing) · See more »

Project Athena

Project Athena was a joint project of MIT, Digital Equipment Corporation, and IBM to produce a campus-wide distributed computing environment for educational use.

New!!: Kerberos (protocol) and Project Athena · See more »

Proprietary protocol

In telecommunications, a proprietary protocol is a communications protocol owned by a single organization or individual.

New!!: Kerberos (protocol) and Proprietary protocol · See more »

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Kerberos (protocol) and RADIUS · See more »

RC4

In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

New!!: Kerberos (protocol) and RC4 · See more »

Realm (disambiguation)

Realm is the dominions of a king (or queen); a kingdom.

New!!: Kerberos (protocol) and Realm (disambiguation) · See more »

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.

New!!: Kerberos (protocol) and Replay attack · See more »

Roger Needham

Roger Michael Needham, CBE, FRS, FREng (9 February 1935 – 1 March 2003) was a British computer scientist.

New!!: Kerberos (protocol) and Roger Needham · See more »

Samba (software)

Samba is a free software re-implementation of the SMB/CIFS networking protocol, and was originally developed by Andrew Tridgell.

New!!: Kerberos (protocol) and Samba (software) · See more »

Seam

Seam may refer to.

New!!: Kerberos (protocol) and Seam · See more »

Secure Remote Password protocol

The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around existing patents.

New!!: Kerberos (protocol) and Secure Remote Password protocol · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Kerberos (protocol) and Secure Shell · See more »

Security and safety features new to Windows Vista

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

New!!: Kerberos (protocol) and Security and safety features new to Windows Vista · See more »

Security domain

A security domain is the determining factor in the classification of an enclave of servers/computers.

New!!: Kerberos (protocol) and Security domain · See more »

Security protocol notation

In cryptography, security (engineering) protocol notation, also known as protocol narrations and Alice & Bob notation, is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network.

New!!: Kerberos (protocol) and Security protocol notation · See more »

Security Support Provider Interface

Security Support Provider Interface (SSPI) is a Win32 API used by Microsoft Windows systems to perform a variety of security-related operations such as authentication.

New!!: Kerberos (protocol) and Security Support Provider Interface · See more »

Server Message Block

In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.

New!!: Kerberos (protocol) and Server Message Block · See more »

Shared secret

In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication.

New!!: Kerberos (protocol) and Shared secret · See more »

Simeon (email client)

Simeon was an IMAP4 email client by The Esys Corporation.

New!!: Kerberos (protocol) and Simeon (email client) · See more »

Simple Authentication and Security Layer

Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols.

New!!: Kerberos (protocol) and Simple Authentication and Security Layer · See more »

Simple Protocol for Independent Computing Environments

In computing, SPICE (the Simple Protocol for Independent Computing Environments) is a remote-display system built for virtual environments which allows users to view a computing "desktop" environment – not only on its computer-server machine, but also from anywhere on the Internet – using a wide variety of machine architectures.

New!!: Kerberos (protocol) and Simple Protocol for Independent Computing Environments · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Kerberos (protocol) and Single sign-on · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Kerberos (protocol) and Solaris (operating system) · See more »

SPN

SPN may refer to: In Computer Sciences.

New!!: Kerberos (protocol) and SPN · See more »

SPNEGO

Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO), often pronounced "spenay-go", is a GSSAPI "pseudo mechanism" used by client-server software to negotiate the choice of security technology.

New!!: Kerberos (protocol) and SPNEGO · See more »

SRV record

A Service record (SRV record) is a specification of data in the Domain Name System defining the location, i.e. the hostname and port number, of servers for specified services.

New!!: Kerberos (protocol) and SRV record · See more »

TACACS

Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack-axe) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server.

New!!: Kerberos (protocol) and TACACS · See more »

Theodore Ts'o

Theodore Yue Tak Ts'o (曹子德) (born 1968) is a software engineer mainly known for his contributions to the Linux kernel, in particular his contributions to file systems.

New!!: Kerberos (protocol) and Theodore Ts'o · See more »

Ticket (IT security)

In IT Security, a ticket is a number generated by a network server for a client, which can be delivered to itself, or a different server as a means of authentication or proof of authorization, and cannot easily be forged.

New!!: Kerberos (protocol) and Ticket (IT security) · See more »

Ticket Granting Ticket

In some computer security systems, a Ticket Granting Ticket or Ticket to Get Tickets (TGT) is a small, encrypted identification file with a limited validity period.

New!!: Kerberos (protocol) and Ticket Granting Ticket · See more »

TkWWW

tkWWW is an early, now discontinued web browser and WYSIWYG HTML editor written by Joseph Wang at MIT as part of Project Athena and the Globewide Network Academy project.

New!!: Kerberos (protocol) and TkWWW · See more »

TLS-PSK

Transport Layer Security pre-shared key ciphersuites (TLS-PSK) is a set of cryptographic protocols that provide secure communication based on pre-shared keys (PSKs).

New!!: Kerberos (protocol) and TLS-PSK · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Kerberos (protocol) and Transport Layer Security · See more »

TSIG

TSIG (Transaction SIGnature) is a computer-networking protocol defined in RFC 2845.

New!!: Kerberos (protocol) and TSIG · See more »

Univention Corporate Server

Univention Corporate Server (UCS) is a server operating system derived from Debian GNU/Linux with an integrated management system for the central and cross-platform administration of servers, services, clients, desktops and users as well as virtualized computers operated in UCS.

New!!: Kerberos (protocol) and Univention Corporate Server · See more »

USC Viterbi School of Engineering

The Viterbi School of Engineering (formerly the USC School of Engineering) is located at the University of Southern California in the United States.

New!!: Kerberos (protocol) and USC Viterbi School of Engineering · See more »

User Account Control

User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed, An overview of UAC in Windows 7 by Paul Thurott version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows 10.

New!!: Kerberos (protocol) and User Account Control · See more »

VisualSVN Server

VisualSVN Server is a freeware Apache Subversion server package for Windows.

New!!: Kerberos (protocol) and VisualSVN Server · See more »

Web Services Security Kerberos Binding

Web Services Security Kerberos Binding is a Web Services specification, authored by IBM and Microsoft, which details how to integrate the Kerberos authentication mechanism with the Web Services Security model.

New!!: Kerberos (protocol) and Web Services Security Kerberos Binding · See more »

Wide Mouth Frog protocol

The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example).

New!!: Kerberos (protocol) and Wide Mouth Frog protocol · See more »

Windows 2000

Windows 2000 (codenamed NT 5.0) is an operating system for use on both client and server computers.

New!!: Kerberos (protocol) and Windows 2000 · See more »

Windows Firewall

Windows Firewall (officially called Windows Defender Firewall in Windows 10), is a firewall component of Microsoft Windows.

New!!: Kerberos (protocol) and Windows Firewall · See more »

Windows Server 2008

Windows Server 2008 is the second major release of the Windows Server family of operating systems for server computers.

New!!: Kerberos (protocol) and Windows Server 2008 · See more »

Windows Services for UNIX

Windows Services for UNIX (SFU) is a discontinued software package produced by Microsoft which provided a Unix environment on Windows NT and some of its immediate successor operating-systems.

New!!: Kerberos (protocol) and Windows Services for UNIX · See more »

WinSCP

WinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows.

New!!: Kerberos (protocol) and WinSCP · See more »

Wireless grid

Wireless grids are wireless computer networks consisting of different types of electronic devices with the ability to share their resources with any other device in the network in an ad hoc manner.

New!!: Kerberos (protocol) and Wireless grid · See more »

WLAN Authentication and Privacy Infrastructure

WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese National Standard for Wireless LANs (GB 15629.11-2003).

New!!: Kerberos (protocol) and WLAN Authentication and Privacy Infrastructure · See more »

WolfSSL

wolfSSL (formerly CyaSSL or yet another SSL) is a small, portable, embedded SSL/TLS library targeted for use by embedded systems developers.

New!!: Kerberos (protocol) and WolfSSL · See more »

Woo–Lam

In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo.

New!!: Kerberos (protocol) and Woo–Lam · See more »

WS-Security

Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services.

New!!: Kerberos (protocol) and WS-Security · See more »

X Window authorization

In the X Window System, programs run as X clients, and as such they connect to the X display server, possibly via a computer network.

New!!: Kerberos (protocol) and X Window authorization · See more »

X.690

X.690 is an ITU-T standard specifying several ASN.1 encoding formats.

New!!: Kerberos (protocol) and X.690 · See more »

Yahalom (protocol)

Yahalom is an authentication and secure key-sharing protocol designed for use on an insecure network such as the Internet.

New!!: Kerberos (protocol) and Yahalom (protocol) · See more »

Zephyr (protocol)

Created at MIT, as part of Project Athena, Zephyr was designed as an instant messaging protocol and application-suite with a heavy Unix background.

New!!: Kerberos (protocol) and Zephyr (protocol) · See more »

Zeroshell

Zeroshell is a small open-source Linux distribution for servers and embedded systems which aims to provide network services.

New!!: Kerberos (protocol) and Zeroshell · See more »

56-bit encryption

In computing, 56-bit encryption refers to a key size of fifty-six bits, or seven bytes, for symmetric encryption.

New!!: Kerberos (protocol) and 56-bit encryption · See more »

Redirects here:

EBones, Ebones, Kerberized, Kerberos 5, Kerberos protocol, Kerberos ticket, Kerberos-protocols, KerberosProtocol, Krb5, Windows 2000 security.

References

[1] https://en.wikipedia.org/wiki/Kerberos_(protocol)

OutgoingIncoming
Hey! We are on Facebook now! »