{"id":5031,"date":"2020-01-23T19:17:02","date_gmt":"2020-01-23T19:17:02","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5031"},"modified":"2021-03-31T19:17:55","modified_gmt":"2021-03-31T18:17:55","slug":"kerberos-authentication","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication","title":{"rendered":"Kerberos Authentication Process Explained"},"content":{"rendered":"<p>In Greek mythology, Kerberos (or Cerberus) is a frightening-looking dog with multiple heads and fangs capable of slicing through human bone. Kerberos is famous for guarding the gates of the underworld to prevent the dead from leaving. Until Kerberos\u2019 capture by the divine hero Heracles, the dog\u2019s tenacious patrol let no soul pass into the world of the living.<\/p>\n<p>The internet is very similar to the underworld\u2014an insecure place full of actors who would seek to compromise our security and steal our data. Like the underworld, it needs powerful gatekeepers to guard and patrol its boundaries, lest vulnerable users are harmed. Thus, when MIT computer scientists were searching for a name for a new computer network authentication protocol that they developed, they turned to the mythical creature Kerberos.<\/p>\n<p>This eponymously named protocol uses top-secret key cryptology to provide powerful authentication for client-server applications. Keberos authentication was first developed in the 1980s and has since become the most commonly used cryptology-based authentication method. The ubiquity of Kerberos makes it critical for managed services providers (MSPs) to know about it\u2014where it came from, what it is, how it works, and how it can benefit their end users.<\/p>\n<h3><b>Why Was Kerberos Authentication Developed?<\/b><\/h3>\n<p>MIT computer scientists developed\u00a0<a class=\"ext\" href=\"https:\/\/web.mit.edu\/kerberos\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kerberos authentication<\/a>\u00a0as one potential solution to pervasive\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/network-authentication-methods\" target=\"_blank\" rel=\"noopener\">network security problems<\/a>\u00a0that grew in tandem with the expansion of the internet in the 1980s.<\/p>\n<p>These security problems were rampant among many of the applications that send unencrypted passwords over the network\u2014passwords that were highly vulnerable to a range of tactics and tools used by malicious actors intent on stealing them. Moreover, some client-server applications automatically assumed a user really was who they said they were, or relied on the client to restrict a user\u2019s activities to those deemed \u201csafe.\u201d Naturally, these applications faced serious security vulnerabilities and would likely fail to meet stringent mandates to protect users\u2019 personal data today.<\/p>\n<p>In response to this internet insecurity, many sites started using firewalls, thinking these would resolve the problem. But firewalls have two limitations that hinder their efficacy. One, they assume the security threat is coming from \u201coutside,\u201d when in fact it\u2019s often insiders who are responsible for the most egregious internet crimes. Two, firewalls limit users from accessing areas of the internet that they may need to access for their work. Other strategies were needed for more effective cybersecurity.<\/p>\n<h3><b>What Is Kerberos Authentication?<\/b><\/h3>\n<p>This is where the aforementioned MIT scientists came into the picture. The product of their collective efforts was Kerberos, a network authentication protocol that\u2019s based on secret-key cryptology or \u201ctickets.\u201d By enabling users or services to communicate securely over a non-secure network through a trusted third-party arbiter, Kerberos eliminates the need to transmit vulnerable plaintext passwords.<\/p>\n<p>The designers of Kerberos based it on a client-server model, meaning it provides resources or services to one or more clients. It also features\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/two-factor-authentication\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a>\u00a0(MFA), meaning that a system requires at least two distinct terms to grant a user access to a certain account. This strengthens password management to keep up with cybersecurity threats and heightens the level of security for all parties involved.<\/p>\n<p>A free implementation of Kerberos authentication is available from MIT, though by now it\u2019s embedded within a range of operating systems and other products available on the market. Kerberos authentication has become the default authorization tool used by Microsoft Windows. Apple OS, UNIX, and Linux also use it. This means most of us have encountered it in one place or another, even if we weren\u2019t aware of it.<\/p>\n<h3><b>How Does Kerberos Authentication Work?<\/b><\/h3>\n<p>We\u2019ve already established that Kerberos securely connects users and servers. It does so within what\u2019s called a\u00a0<em>realm-<\/em><i>\u2014<\/i>or a defined domain that contains a set of users and servers who would connect (though cross-realm connection is also possible). Each user or server has their own identity\u2014referred to as a\u00a0<em>principal<span style=\"font-family: SWMSP;\">\u00a0<\/span><\/em>in Kerberos. Through their individual principal, users or servers can identify themselves to a trusted third-party arbiter responsible for authentication.<\/p>\n<p>That trusted third-party arbiter is the Key Distribution Center (KDC), located on the Kerberos server. The KDC has three main parts that are important to understand.<\/p>\n<ul>\n<li><b>Authentication server (AS)<\/b>: This server is responsible for performing initial authentication. Say a user seeks to authenticate their identity for a system or service. The AS receives that request and issues what is called a ticket-granting ticket (TGT), or a small encrypted user authentication ticket, and sends it back to the user. The TGT contains a session key that\u2014provided the user\u2019s insertion of a correct password\u2014presents the ticket to the ticket granting service.<\/li>\n<li><b>Ticket granting server (TGS)<\/b>: This is a user authentication server that is responsible for validating TGTs and granting subsequent tickets called service tickets. Service tickets permit an authenticated user to access the service that they are trying to use on the application server.<\/li>\n<li><b>Kerberos database<\/b>: Housed within the KDC, this is a database that contains all principal IDs, their passwords, and a host of information about them. It\u2019s essential to the fluid functioning of the overall Kerberos authentication process.<\/li>\n<\/ul>\n<p>Through the mediation of the KDC, different principals that share the same Kerberos realm can communicate safely and securely.<\/p>\n<h3><b>What Are the Benefits of Kerberos Authentication?<\/b><\/h3>\n<p>Now we have a firm grasp of what Kerberos authentication is and how it works, let\u2019s turn to how it can benefit your company and end users.<\/p>\n<p>Kerberos authentication carries a range of advantages, especially compared to some of its predecessors. Some of these end user benefits include:<\/p>\n<ul>\n<li>Powerful encryption<\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/single-sign-on-authentication\" target=\"_blank\" rel=\"noopener\">Single sign-on (SSO)<\/a><\/li>\n<li>Open standard<\/li>\n<li>Mutual authentication<\/li>\n<li>Fast authentication processing<\/li>\n<li>Authentication delegation<\/li>\n<li>Integrated and renewable sessions<\/li>\n<li>Centralized username and password data storage<\/li>\n<li>Improved network security<\/li>\n<\/ul>\n<p>For MSPs, it\u2019s important to know about Keberos because it\u2019s integral to so many of the operating systems and applications we use on a daily basis. But this authentication protocol also holds distinct advantages that can help MSPs better serve their customers and drive their business forward.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5031","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kerberos Authentication Process Explained - N-able<\/title>\n<meta name=\"description\" content=\"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kerberos Authentication Process Explained - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-23T19:17:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-31T18:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Kerberos Authentication Process Explained\",\"datePublished\":\"2020-01-23T19:17:02+00:00\",\"dateModified\":\"2021-03-31T18:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\"},\"wordCount\":1011,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\",\"name\":\"Kerberos Authentication Process Explained - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-01-23T19:17:02+00:00\",\"dateModified\":\"2021-03-31T18:17:55+00:00\",\"description\":\"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kerberos Authentication Process Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kerberos Authentication Process Explained - N-able","description":"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication","og_locale":"fr_FR","og_type":"article","og_title":"Kerberos Authentication Process Explained - N-able","og_description":"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-01-23T19:17:02+00:00","article_modified_time":"2021-03-31T18:17:55+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Kerberos Authentication Process Explained","datePublished":"2020-01-23T19:17:02+00:00","dateModified":"2021-03-31T18:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication"},"wordCount":1011,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication","url":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication","name":"Kerberos Authentication Process Explained - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-01-23T19:17:02+00:00","dateModified":"2021-03-31T18:17:55+00:00","description":"Read about Kerberos authentication, how it works, and the benefits of keeping your end users secure with this security layer.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/kerberos-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Kerberos Authentication Process Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5031"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5031\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}