Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
We begin this discussion with an overview on Kerberos technology for network authentication. Think neighborhood carnival, that's the analogy used to help explain how Kerberos authentication works. You'll learn in detail what each phase of access control entails, and how interdependent those stages are upon one another in order for the appropriate access to be granted, and what happens when or to cause a rejection of an access request.