Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, CBT Nuggets trainer Don Jones walks through how Kerberos works in Active Directory for Windows networks. Learn more about what Kerberos is and how it works with this MicroNugget video from CBT Nuggets.
Kerberos is the native authentication protocol in Active Directory. It's used by Windows networks everywhere. Understanding Active Directory’s more advanced concepts, like delegation, depends on understanding what’s happening under the hood in Kerberos.
Any time authentication is necessary, there are three players: the client making the request, the file server that contains the information, and the KDC or Key Distribution Controller.
In Kerberos, there’s no communication between the file server and the KDC. Because the client takes on the majority of the processing burden. That distributes the authentication workload across the network, securely.
First, the client constructs an authenticator, a package that establishes who the client claims to be, along with the date & time. These authenticators, and the tickets that will follow, have a limited lifespan.
Watch and see how the authenticator gets processed by the KDC, where the ticket-generating ticket (TGT) is stored on the client's machine, and how that TGT grants it access to various resources.
0:25: 3 different parties in authentication
1:25: What happens when a client attempts a secure log-in
3:10: A ticket-granting-ticket (TGT)
5:00: When a ticket is generated by the KDC
5:30: When a client sends a request to a file server
6:50: Overview
Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/g8ch
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/b41w
Start learning with CBT Nuggets:
• All Windows Server 2008 | https://courses.cbt.gg/r8l
• Microsoft Server 2019 Essentials | https://courses.cbt.gg/qnh
• Microsoft Windows Server 2016 Identities (70-742) | https://courses.cbt.gg/dcv