У нас вы можете посмотреть бесплатно Kerberos Authentication Process Overview and Explainer или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
How does Kerberos work? This video provides an overview of Kerberos authentication and provides details related to the authentication process. Kerberos authentication is currently the default authorization technology used by Microsoft Windows, and implementations of Kerberos exist in Apple OS, FreeBSD, UNIX, and Linux. This video is organized into three sections. The first section explores the different components of Kerberos and the messages transmitted as part of a Kerberos authentication exchange are introduced. This section will give you the basics of how Kerberos works. In the second section, we examine the messages passed between components and how the different encryption keys introduced in the overview get used in practice. We look at both the initial authentication of the user and how the user then authenticates to a service. Finally, we explore two advanced topics: Kerberos Delegation and Kerberos Cross Realm authentication. You may use any of these links to jump to a specific topic. Chapters 00:00 – OVERVIEW KERBEROS AUTHENTICATION 00:25 – Kerberos Components 01:19 – Long-Term Keys and Session Keys 03:30 – Authentication Service Request 04:54 – Authentication Service Response 06:42 – Ticket Granting Service Request 09:02 – Ticket Granting Service Response 10:27 – Client Server Authentication Request 12:25 – Client Server Authentication Response 13:48 – Further Information (see links below) 15:03 – KERBEROS AUTHENTICATION PROCESS 15:35 – Authenticating the User 19:25 – Authenticating to a Service 24:55 – Further Information (see links below) 25:53 – ADVANCED KERBEROS AUTHENTICATION PROCESS 26:20 – Delegating Forwarding Authentication 35:55 – Cross Realm Authentication 41:14 – Further Information (see links below) Further Information ◉ The Kerberos Network Authentication Service (V5), RFC 4120 available at https://www.ietf.org/rfc/rfc4120.txt ◉ The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API), RFC 4121 available at https://tools.ietf.org/html/rfc4121 ◉ Microsoft: How the Kerberos Version 5 Authentication Protocol Works available at https://technet.microsoft.com/en-us/l... Additional Resources ◉ Kerberos Delegation with SAS 9.4 – https://support.sas.com/resources/pap... SUBSCRIBE TO THE SAS USERS YOUTUBE CHANNEL #SASUsers #LearnSAS https://www.youtube.com/SASUsers?sub_... ABOUT SAS SAS is a trusted analytics powerhouse for organizations seeking immediate value from their data. A deep bench of analytics solutions and broad industry knowledge keep our customers coming back and feeling confident. With SAS®, you can discover insights from your data and make sense of it all. Identify what’s working and fix what isn’t. Make more intelligent decisions. And drive relevant change. CONNECT WITH SAS SAS ► https://www.sas.com SAS Customer Support ► https://support.sas.com SAS Communities ► https://communities.sas.com SAS Analytics Explorers ► https://explorers.sas.com Facebook ► / sassoftware Twitter ► / sassoftware LinkedIn ► / sas Blogs ► https://blogs.sas.com RSS ► https://www.sas.com/rss