Respuesta :
To grant authorized users access to systems appropriate to their authorization level, Kerberos uses both KDCs and TGSs in the authentication and authorization process.
What is Kerberos? How Does Kerberos Work?
- Across an untrusted network, such as the internet, the kerberos computer network security protocol authenticates service requests between two or more trusted hosts. It authenticates client-server applications and confirms users' identities using secret-key cryptography and a reliable third party.
- The Massachusetts Institute of Solution (MIT) first created Kerberos for Project Athena in the late 1980s. Kerberos is currently Microsoft Windows' standard authorisation technology. Additionally, there are Kerberos implementations for other operating systems such Apple OS, FreeBSD, UNIX, and Linux.
- In Windows 2000, Microsoft released its version of Kerberos, and it has since emerged as the preferred protocol for websites and single sign-on applications across several platforms. The open-source project Kerberos is maintained by the Kerberos Consortium.
- The three-headed dog Kerberos, sometimes known as Cerberus, who served as the canine gatekeeper of the underworld's entrance in Greek mythology, is the source of the protocol's name. Despite one notable exception, Kerberos was a fairly helpful guardian despite having a snake tail and an especially terrible temper.
- However, in the context of the protocol, the three Kerberos heads stand in for the client, the server, and the Key Distribution Center (KDC). As a trusted third-party authentication service, the latter performs its duties.
- Users, workstations, and services that use Kerberos rely solely on the KDC, which runs as a single process and handles both ticket-granting and authentication. All parties can authenticate themselves using KDC "tickets," which enables nodes to do so safely. The shared secret used in the Kerberos authentication process is standard.
To Learn more about Kerberos refer to:
https://brainly.com/question/28066463
#SPJ4