Kerberos Authentication; Kerberos Server Authentication With Tickets Support - Avocent Cyclades ACS Command Reference Manual

Advanced console server
Table of Contents

Advertisement

48
ACS Advanced Console Server Command Reference Guide
The following examples illustrate the use of NIS to authenticate users.
Authenticate the user in the local database; if the user is not found, then use NIS.
passwd: files nis
shadow: files nis
group: files nis
Authenticate the user using NIS; if the user is not found, then use the local database.
passwd: nis files
shadow: nis files
group: nis files
Authenticate the user using NIS; if the user is not found or the NIS server is down, use the
local database.
passwd: nis [UNAVAIL=continue TRYAGAIN=continue] files
shadow: nis [UNAVAIL=continue TRYAGAIN=continue] files
group: nis [UNAVAIL=continue TRYAGAIN=continue] files

Kerberos Authentication

Kerberos is a network authentication protocol designed for use on unsecured networks, based on
the key distribution model. It allows individuals communicating over a network to prove their
identity to each other while preventing eavesdropping or replay attacks. It provides detection of
modification and prevention of unauthorized reading.

Kerberos server authentication with tickets support

The ACS console server has support to interact on a kerberized network. On a kerberized network,
the Kerberos database contains principals and keys (for users, keys are derived from passwords).
The Kerberos database also contains keys for all of the network services.
When a user on a kerberized network logs in to the workstation, the principal is sent to the Key
Distribution Center (KDC) as a request for a Ticket Granting Ticket (TGT). This request may be
sent by the login program so that it is transparent to the user, or may be sent by the kinit program
after the user logs in.
The KDC checks for the principal in its database. If the principal is found, the KDC creates a TGT,
encrypts it using the user's key and sends it back to the user.
The login program or kinit decrypts the TGT using the user's key, which is computed from the
user's password. The TGT, which is set to expire after a certain period of time, is stored in the
credentials cache. An expiration time is set so that a compromised TGT may only be used for a
certain period of time, usually eight hours, unlike a compromised password, which could be used
until changed. The user does not have to re-enter the password until the TGT expires or a new
session is started.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents