summaryrefslogtreecommitdiff
path: root/src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm
diff options
context:
space:
mode:
Diffstat (limited to 'src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm')
-rw-r--r--src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm105
1 files changed, 105 insertions, 0 deletions
diff --git a/src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm b/src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm
new file mode 100644
index 000000000000..82837655c716
--- /dev/null
+++ b/src/windows/leash/htmlhelp/html/Kerberos_Terminology.htm
@@ -0,0 +1,105 @@
+<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
+<html><head>
+<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">
+<link rel="stylesheet" type="text/css" href="Leash.css">
+<title>Kerberos Terminology</title></head>
+
+<body>
+<h1><a name="top"> Kerberos Terminology</a></h1>
+<p>
+It is helpful to understand three terms when using Kerberos; <a href="#principal"> principals</a>, <a href="#realm"> realms</a>, and <a href="#ticket"> tickets</a>.</p>
+<p>
+<table>
+<tbody><tr>
+<th><a name="principal">Principals</a></th>
+</tr>
+<tr>
+<td>
+ A Kerberos <i>principal</i> is a unique identity that uses
+Kerberos. For users, it is the identity you use to log on to Kerberos.
+Principals are a combination of your user name and the name of the <a href="#realm"> realm</a> (or domain) you belong to, in the form <span class="typed">username@REALM.NAME.</span> For example: <span class="typed">jdoe@SALES.WIDGET.COM.</span>
+Some people will have more than one principal. An administrator might
+have a regular principal and a separate one with administrative rights.
+Or if a particular installation uses multiple realms and requires a
+separate log-on for each one, people with access to multiple realms
+will have a principal for each realm.
+<p></p>
+Because Kerberos provides <em>mutual</em> authentication, the
+network resources that use Kerberos also have unique principals.
+However, you do not need to know a service's principal to access it.<p></p>
+<a href="#top">Back to Top</a>
+</td>
+</tr>
+<tr>
+<th> <a name="realm"> Realms</a> </th>
+</tr>
+<tr>
+<td>
+ Kerberos <i>realms</i> are a way of logically grouping
+resources and identities that use Kerberos. Your realm is the home of
+your Kerberos identity and your point of entry to the network resources
+controlled by Kerberos. In Windows, realms are called <em>domains.</em>
+<p></p>
+When a Kerberos installation is set up, administrators decide how to
+group identities and network resources into realms. For example, some
+installations group all network resources into one realm. Others group
+all identities into one realm that is solely used as an entry point to
+resources grouped in other realms. Depending on your installation and
+your needs, you might have a <a href="#principal"> principal</a>
+(or principals) in only one realm that provides you with all the access
+you need, or you might have different principals for accessing
+different realms.
+<p></p>Realms are usually named after the DNS domain they correspond
+to, but using all upper case letters. For example, Widget Makers
+Incorporated might have a realm named <span type="" typed="">WIDGETMAKERSINC.COM.</span> By definition, each network resource in a Kerberos realm uses the same Kerberos installation for authentication.<p></p>
+ <p></p>
+<a href="#top">Back to Top</a>
+</td>
+</tr>
+
+<tr>
+<th> <a name="ticket">Tickets</a></th>
+</tr>
+<tr>
+<td>
+Kerberos uses the concept of <i>tickets </i> to keep passwords
+from being transmitted in the clear and to provide users the
+convenience of a single log-on to access multiple services and hosts. <p></p>
+Once a you provide a valid principal and password, Kerberos issues you
+a ticket with a limited lifetime. This ticket is an encrypted block of
+data that authenticates you. In most cases the ticket allows you to
+access all of the appropriate network resources in the realm you use,
+for the lifetime of the ticket, without having to take any further
+action. <p></p>
+When you access one of these resources, MIT Kerberos passes your
+initial Ticket Granting Ticket (TGT) to the service. Kerberos verifies
+the ticket and then issues a separate ticket that allows access to that
+service. You don't have to worry about obtaining or managing these new
+service tickets; they are automatically issued. Service tickets can be
+viewed with MIT Kerberos but cannot be directly obtained or destroyed
+through it.
+<p></p>
+Tickets contain two <a href="JavaScript:popup.TextPopup(popupEncryptionKey, popfont,9,9,-1,-1)">encryption keys</a>:
+the ticket key and the session key. The ticket key is shared between
+the Kerberos infrastructure and the service you are using. The session
+key is shared between you and the service, and is used to encrypt and
+decrypt communication with the service. <p></p>
+<a href="#top">Back to Top</a>
+</td>
+</tr>
+</tbody></table>
+</p><h2>Related Help</h2>
+<ul id="helpul">
+<li><a href="HTML/Kerberos.htm">What is Kerberos?</a></li>
+<li><a href="HTML/How_Kerberos_Works.htm">How does Kerberos work?</a></li>
+<li><a href="HTML/Encryption_Types.htm">Encryption types</a></li>
+</ul>
+
+<script language="JavaScript">
+popfont="Arial,.725,"
+popupEncryptionKey="A value that a specific code or algorithim uses to makes information unreadable to anyone without a matching key."
+</script>
+
+<object id="popup" type="application/x-oleobject" classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11">
+</object>
+</body></html>