Kerberos : The Definitive Guide (Paperback)
Jason Garman
- 出版商: O'Reilly
- 出版日期: 2003-09-16
- 售價: $1,540
- 貴賓價: 9.5 折 $1,463
- 語言: 英文
- 頁數: 274
- 裝訂: Paperback
- ISBN: 0596004036
- ISBN-13: 9780596004033
下單後立即進貨 (約1週~2週)
買這商品的人也買了...
-
$680$578 -
$680$578 -
$980$833 -
$580$452 -
$2,200$2,090 -
$580$458 -
$880$695 -
$480$408 -
$1,600$1,520 -
$1,630$1,549 -
$690$587 -
$780$741 -
$580$458 -
$590$466 -
$1,470$1,397 -
$1,400$1,372 -
$690$538 -
$1,080$1,058 -
$720$612 -
$620$490 -
$820$779 -
$750$638 -
$560$476 -
$480$408 -
$650$507
相關主題
商品描述
Kerberos, the single sign-on authentication system originally developed at
MIT, deserves its name. It's a faithful watchdog that keeps intruders out of
your networks. But it has been equally fierce to system administrators, for whom
the complexity of Kerberos is legendary.
Single sign-on is the holy
grail of network administration, and Kerberos is the only game in town.
Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and
2003, has extended the reach of Kerberos to all networks large or small.
Kerberos makes your network more secure and more convenient for users by
providing a single authentication system that works across the entire network.
One username; one password; one login is all you need.
Fortunately, help
for administrators is on the way. Kerberos: The Definitive Guide shows
you how to implement Kerberos for secure authentication. In addition to covering
the basic principles behind cryptographic authentication, it covers everything
from basic installation to advanced topics like cross-realm authentication,
defending against attacks on Kerberos, and troubleshooting.
In addition
to covering Microsoft's Active Directory implementation, Kerberos: The
Definitive Guide covers both major implementations of Kerberos for Unix and
Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos
client. The book also covers both versions of the Kerberos protocol that are
still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention
to the integration between the different protocols, and between Unix and Windows
implementations.
If you've been avoiding Kerberos because it's confusing
and poorly documented, it's time to get on board! This book shows you how to put
Kerberos authentication to work on your Windows and Unix systems.
Table of Contents
Preface
1. Introduction
Origins
What Is Kerberos?
Goals
Evolution
Other Products2. Pieces of the Puzzle
The Three As
Directories
Privacy and Integrity
Kerberos Terminology and Concepts
Putting the Pieces Together3. Protocols
The Needham-Schroeder Protocol
Kerberos 4
Kerberos 5
The Alphabet Soup of Kerberos-Related Protocols4. Implementation
The Basic Steps
Planning Your Installation
Before You Begin
KDC Installation
DNS and Kerberos
Client and Application Server Installation5. Troubleshooting
A Quick Decision Tree
Debugging Tools
Errors and Solutions6. Security
Kerberos Attacks
Protocol Security Issues
Security Solutions
Protecting Your KDC
Firewalls, NAT, and Kerberos
Auditing7. Applications
What Does Kerberos Support Mean?
Services and Keytabs
Transparent Kerberos Login with PAM
Mac OS X and the Login Window
Kerberos and Web-Based Applications
The Simple Authentication and Security Layer (SASL)
Kerberos-Enabled Server Packages
Kerberos-Enabled Client Packages
More Kerberos-Enabled Packages8. Advanced Topics
Cross-Realm Authentication
Using Kerberos 4 Services with Kerberos 5
Windows Issues
Windows and Unix Interoperability9. Case Study
The Organization
Planning
Implementation10. Kerberos Futures
Public Key Extensions
Smart Cards
Better Encryption
Kerberos Referrals
Web ServicesAppendix: Administration Reference
Index