An Enhanced SharePoint Authentication using Kerberos
نویسندگان
چکیده
Kerberos is the widely deployed authentication protocol. This document gives you comparison between NTLM and Kerberos authentication. And it gives information on how Kerberos authentication plays a vital role in authentication and delegation scenarios, and the situations where Kerberos authentication should be used or may be required in solution designs. Scenarios include business intelligence implementations which secure access to external data sources such as SQL Server. The document also shows how to configure Kerberos authentication end-to-end within your environment, including scenarios that use various service applications in Microsoft SharePoint Server. Additional tools and resources are described to help you test and validate Kerberos configuration.
منابع مشابه
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enha...
متن کاملApplicability of Smart Cards to Network User Authentication
This paper addresses security issues associated with authenticating users to system services in distributed information systems. Its focus is the presentation of an approach for augmenting the Kerberos network user identification and authentication protocol through the integration of emerging smart card technology. Our conclusions indicate that the security of Kerberos-based network authenticat...
متن کاملA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modification in Kerberos will be modified to yield be...
متن کاملKerberos Authentication in Wireless Sensor Networks
We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station. In this paper we have provided architecture for the aut...
متن کامل