--%>

What is realm

In the context of Kerberos, what is meant by the term realm?

E

Expert

Verified

A full service Kerberos environment comprises of the Kerberos server, a number of clients, number of application server need the following:

a) The Kerberos server should have user ID and hashed the password of all participating users within its database.

b) The Kerberos server should share the secret key with every server. Such an environment is known as ‘Realm’. 

   Related Questions in Computer Network Security

  • Q : Advances of LAN Security Setup Advances

    Advances of LAN Security Setup: The company should use firewall in order to separate the wireless Local Area Network. A gateway/ firewall is used in order to separate the wireless and wired networks. This helps to screen the traffic in wired network.

  • Q : E-mail compatibility function in PGP

    Explain the need of E-mail compatibility function in PGP?

  • Q : Security in networks What is Security

    What is Security in networks? Explain.

  • Q : What is Key Expansion Algorithm Explain

    Explain the Key Expansion Algorithm.

  • Q : Limitations of SMTP/RFC 822 Explain

    Explain some of the limitations of the SMTP/RFC 822?

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : IP security services List the protocols

    List the protocols which are used to provide the IP security? Explain the IP security services?

  • Q : Block cipher modes Explain why some

    Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?