As the company grows, Joseph fears legitimate users may be impersonated to access company network resources. You, as a c
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
As the company grows, Joseph fears legitimate users may be impersonated to access company network resources. You, as a c
company grows, Joseph fears legitimate users may be impersonated to access company network resources. You, as a consultant, know that Kerberos would be the answer to Joseph's requirement regarding user authentication. Why Kerberos should be chosen for this purpose? Does Kerberos use symmetric or asymmetric cryptography? Explain. - How does Kerberos authenticate each client? You may discuss Kerberos Ticket-Granting Server (TGS) and Ticket Granting Ticket (TGT). How does Kerberos tackle the problem of replay attacks?
As the