--%>

What is realm

In the context of Kerberos, what is meant by the term realm?

E

Expert

Verified

A full service Kerberos environment comprises of the Kerberos server, a number of clients, number of application server need the following:

a) The Kerberos server should have user ID and hashed the password of all participating users within its database.

b) The Kerberos server should share the secret key with every server. Such an environment is known as ‘Realm’. 

   Related Questions in Computer Network Security

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Distribution of secret keys to

    Specify the ways through which the secret keys may be distributed to the two communicating parties.

  • Q : What is ReefEdge Connect System

    ReefEdge Connect System: The ReefEdge connect system works on three layers of security: privacy, access control and authentication. The system then recognizes the technologies needed to address the security requirement for each of the above mentioned

  • Q : Final set of criteria to determine

    Explain the final set of criteria which is used by the NIST in order to determine the candidate AES ciphers?

  • Q : Requirements for process of message

    State requirements for the process of message authentication.

  • Q : What is Wimax Backhaul Briefly explain

    Briefly explain about Wimax Backhaul?

  • Q : Operations in Blowfish Explain the

    Explain the primitive operations which are used in the Blowfish?

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Explain Identifier Explain the term key

    Explain the term key Identifier?

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.