Kerberos

個数:

Kerberos

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 260 p.
  • 言語 ENG
  • 商品コード 9780596004033
  • DDC分類 005.8

Full Description

Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. This guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client.
The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.

Contents

Preface 1. Introduction Origins What Is Kerberos? Goals Evolution Other Products 2. Pieces of the Puzzle The Three As Directories Privacy and Integrity Kerberos Terminology and Concepts Putting the Pieces Together 3. Protocols The Needham-Schroeder Protocol Kerberos 4 Kerberos 5 The Alphabet Soup of Kerberos-Related Protocols 4. Implementation The Basic Steps Planning Your Installation Before You Begin KDC Installation DNS and Kerberos Client and Application Server Installation 5. Troubleshooting A Quick Decision Tree Debugging Tools Errors and Solutions 6. Security Kerberos Attacks Protocol Security Issues Security Solutions Protecting Your KDC Firewalls, NAT, and Kerberos Auditing 7. Applications What Does Kerberos Support Mean? Services and Keytabs Transparent Kerberos Login with PAM Mac OS X and the Login Window Kerberos and Web-Based Applications The Simple Authentication and Security Layer (SASL) Kerberos-Enabled Server Packages Kerberos-Enabled Client Packages More Kerberos-Enabled Packages 8. Advanced Topics Cross-Realm Authentication Using Kerberos 4 Services with Kerberos 5 Windows Issues Windows and Unix Interoperability 9. Case Study The Organization Planning Implementation 10. Kerberos Futures Public Key Extensions Smart Cards Better Encryption Kerberos Referrals Web Services Appendix: Administration Reference Index