The Kerberos protocol involves two servers, the Kerberos Authentication Server and one or more Ticket‑Granting Servers (TGSs).
The process is:
Because this authenticator contains plain text encrypted with the session key, it proves that the sender knows the key. Encrypting the time of day prevents an eavesdropper who records both the ticket and the authenticator from replaying them later.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|