Kerberos Authentication Security
Provides products for database security, web security, and security infrastructure based on the Kerberos protocol, and also provides Kerberos consulting and support.
Top: Computers: Security: Authentication
Kerberos
See Also:
Editor's Picks:
Kerberos: The Network Authentication Protocol - Reference distribution and official documentation for Kerberos. Software is subject to US export control. (MIT)
- Kerberos: An Authentication Service for Computer Networks - A technical paper documenting the system and standard. Includes diagrams and references.
- How to Kerberize your Site - Excellent tutorial on implementation. Contains detailed steps to follow for a successful installation, as well as answers to common questions.
- Kerberos FAQ - Answers to frequently asked questions.
- Kerberos Reference Page - An index of related resources. Includes software distributions security and patches, as well as user documentation.
- Kerberos Network Authentication Service - A resource site with documentation, papers and software distributions. Software may be subject to US export control.
- GNU Shishi - Freely available implementation of Kerberos 5. Includes system documentation and authentication downloads.
- CERT Advisory: Buffer Overflow in Kerberos Administration Daemon - "Multiple Kerberos distributions contain a remotely exploitable buffer authentication overflow in kerberos the Kerberos administration daemon. A remote authentication attacker could exploit this kerberos vulnerability to gain root authentication privileges on a vulnerable system."
- RFC 1510 - An overview and specification of the official internet kerberos protocol.
- Cybersafe Ltd - Provides products for database security, web security, and security infrastructure authentication based on the Kerberos protocol, and also provides Kerberos consulting authentication and support.
- Heimdal - An international free implementation. Includes downloads, distribution information kerberos and mailing list contacts.
- MIT Kerberos Consortium - Created to establish Kerberos as a universal authentication security platform for the world\\'s computer networks. Includes news security and events, details of sponsors and those involved, security and membership information.
- Notes on Integrating Windows, RedHat, and HPUX Using Kerberos - Brief tutorial on configuring *nix systems to authenticate kerberos off a kerberos Microsoft Active Directory server.
MySQL - Cache Direct