Which of the following types of authentication solutions use tickets to provide access to various resources from
a central location?
The basic process of Kerberos authentication is as follows:
1. The subject provides logon credentials.
2. The Kerberos client system encrypts the password and transmits the protected credentials to the KDC.3. The KDC verifies the credentials and then creates a ticket-granting ticket (TGT—a hashed form of the
subject’s password with the addition of a time stamp that indicates a valid lifetime). The TGT is encrypted
and sent to the client.
4. The client receives the TGT. At this point, the subject is an authenticated principle in the Kerberos realm.
5. The subject requests access to resources on a network server. This causes the client to request a service
ticket (ST) from the KDC.
6. The KDC verifies that the client has a valid TGT and then issues an ST to the client. The ST includes a time
stamp that indicates its valid lifetime.
7. The client receives the ST.
8. The client sends the ST to the network server that hosts the desired resource.
9. The network server verifies the ST. If it’s verified, it initiates a communication session with the client. From
this point forward, Kerberos is no longer involved.