1.

What Is The Process Of User Authentication (kerberos V5) In Windows 2000?

Answer»

After giving logon credentials an encryption key will be generated which is used to encrypt the time STAMP of the CLIENT machine. User name and encrypted timestamp information will be provided to domain controller for authentication. Then Domain controller based on the PASSWORD information stored in AD for that user it decrypts the encrypted time stamp information. If PRODUCES time stamp matches to its time stamp. It will provide logon session key and Ticket granting ticket to client in an encryption format. Again client decrypts and if produced time stamp information is MATCHING then it will use logon session key to logon to the domain. Ticket granting ticket will be used to generate service granting ticket when accessing network resources.

After giving logon credentials an encryption key will be generated which is used to encrypt the time stamp of the client machine. User name and encrypted timestamp information will be provided to domain controller for authentication. Then Domain controller based on the password information stored in AD for that user it decrypts the encrypted time stamp information. If produces time stamp matches to its time stamp. It will provide logon session key and Ticket granting ticket to client in an encryption format. Again client decrypts and if produced time stamp information is matching then it will use logon session key to logon to the domain. Ticket granting ticket will be used to generate service granting ticket when accessing network resources.



Discussion

No Comment Found