aboutsummaryrefslogtreecommitdiff
path: root/lib/krb5/kerberos.cat8
blob: a6e1fa3fe370456c71fb3d29a92489f5c31e1db5 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57

KERBEROS(8)               BSD System Manager's Manual              KERBEROS(8)

NNAAMMEE
     kkeerrbbeerrooss -- introduction to the Kerberos system

DDEESSCCRRIIPPTTIIOONN
     Kerberos is a network authentication system. Its purpose is to securely
     authenticate users and services in an insecure network environment.

     This is done with a Kerberos server acting as a trusted third party,
     keeping a database with secret keys for all users and services (collec-
     tively called _p_r_i_n_c_i_p_a_l_s).

     Each principal belongs to exactly one _r_e_a_l_m, which is the administrative
     domain in Kerberos. A realm usually corresponds to an organisation, and
     the realm should normally be derived from that organisation's domain
     name. A realm is served by one or more Kerberos servers.

     The authentication process involves exchange of `tickets' and
     `authenticators' which together prove the principal's identity.

     When you login to the Kerberos system, either through the normal system
     login or with the kinit(1) program, you acquire a _t_i_c_k_e_t _g_r_a_n_t_i_n_g _t_i_c_k_e_t
     which allows you to get new tickets for other services, such as tteellnneett or
     ffttpp, without giving your password.

     For more information on how Kerberos works, and other general Kerberos
     questions see the Kerberos FAQ at
     _h_t_t_p_:_/_/_w_w_w_._n_r_l_._n_a_v_y_._m_i_l_/_C_C_S_/_p_e_o_p_l_e_/_k_e_n_h_/_k_e_r_b_e_r_o_s_-_f_a_q_._h_t_m_l.

     For setup instructions see the Heimdal Texinfo manual.

SSEEEE AALLSSOO
     ftp(1), kdestroy(1), kinit(1), klist(1), kpasswd(1), telnet(1)

HHIISSTTOORRYY
     The Kerberos authentication system was developed in the late 1980's as
     part of the Athena Project at the Massachusetts Institute of Technology.
     Versions one through three never reached outside MIT, but version 4 was
     (and still is) quite popular, especially in the academic community, but
     is also used in commercial products like the AFS filesystem.

     The problems with version 4 are that it has many limitations, the code
     was not too well written (since it had been developed over a long time),
     and it has a number of known security problems. To resolve many of these
     issues work on version five started, and resulted in IETF RFC 1510 in
     1993. IETF RFC 1510 was obsoleted in 2005 with IETF RFC 4120, also known
     as Kerberos clarifications. With the arrival of IETF RFC 4120, the work
     on adding extensibility and internationalization have started (Kerberos
     extensions), and a new RFC will hopefully appear soon.

     This manual page is part of the HHeeiimmddaall Kerberos 5 distribution, which
     has been in development at the Royal Institute of Technology in Stock-
     holm, Sweden, since about 1997.

HEIMDAL                        September 1, 2000                       HEIMDAL