Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this segment, we visually diagraph the Kerberos Authentication process for you as it occur at the network access level. You'll see and learn in action what validation happens for public vs. private and encrypted vs. non-encrypted information, what services are involved, what transactions take place at each stage, and what hiccups can be encountered when errors and other like events take place, and what role the key distribution center plays. And finally, we identify, concerns about the Kerberos model, then discuss and explore single sign-on technologies and their differences.