Download Kerberos Protocol Diagram Pics. Before kerberos, microsoft used an authentication technology called ntlm. Kerberos is the protocol most used in modern authentication system.
As_rep, step 2 in the diagram. The protocol was named after the character kerberos (or cerberus) from greek mythology, the ferocious. The kerberos v5 authentication protocol has an authentication service identifier of rpc_c_authn_gss_kerberos.
A minor detail but one i would want to validate.
Before kerberos, microsoft used an authentication technology called ntlm. Kerberos protocol support is provided in remote applications, such as ftp, rcp, rdist, rlogin, rsh, ssh, and telnet. The kerberos v5 authentication protocol has an authentication service identifier of rpc_c_authn_gss_kerberos. Kdc searches the user's password in the directory database, and uses the same hashing.