How the Kerberos Service Works
The following is an overview of the Kerberos authentication system. For a more
detailed description, see How the Kerberos Authentication System Works.
From the user's standpoint, the Kerberos service is mostly invisible after the Kerberos
session has been started. Commands such as rsh or ftp work about
the same. Initializing a Kerberos session often involves no more than logging in
and providing a Kerberos password.
The Kerberos system revolves around the concept of a ticket. A ticket is
a set of electronic information that identifies a user or a service such
as the NFS service. Just as your driver's license identifies you and indicates
what driving privileges you have, so a ticket identifies you and your network
access privileges. When you perform a Kerberos-based transaction (for example, if you remote
log in to another machine), you transparently send a request for a ticket
to a Key Distribution Center, or KDC. The KDC accesses a database to authenticate your
identity and returns a ticket that grants you permission to access the other
machine. “Transparently” means that you do not need to explicitly request a ticket.
The request happens as part of the rlogin command. Because only an
authenticated client can get a ticket for a specific service, another client cannot
use rlogin under an assumed identity.
Tickets have certain attributes associated with them. For example, a ticket can be
forwardable, which means that it can be used on another machine without a
new authentication process. A ticket can also be postdated, which means that it
is not valid until a specified time. How tickets can be used, for
example, to specify which users are allowed to obtain which types of ticket,
is set by policies. Policies are determined when the Kerberos service is installed
or administered.
Note - You will frequently see the terms credential and ticket. In the greater
Kerberos world, they are often used interchangeably. Technically, however, a credential is a
ticket plus the session key for that session. This difference is explained in
more detail in Gaining Access to a Service Using Kerberos.
The following sections further explain the Kerberos authentication process.
Initial Authentication: the Ticket-Granting Ticket
Kerberos authentication has two phases: an initial authentication that allows for all subsequent
authentications, and the subsequent authentications themselves.
The following figure shows how the initial authentication takes place.
Figure 21-1 Initial Authentication for a Kerberos Session
A client (a user, or a service such as NFS) begins a Kerberos session by requesting a ticket-granting ticket (TGT) from the Key Distribution Center (KDC). This request is often done automatically at login.
A ticket-granting ticket is needed to obtain other tickets for specific services. Think of the ticket-granting ticket as similar to a passport. Like a passport, the ticket-granting ticket identifies you and allows you to obtain numerous “visas,” where the “visas” (tickets) are not for foreign countries but for remote machines or network services. Like passports and visas, the ticket-granting ticket and the other various tickets have limited lifetimes. The difference is that “Kerberized” commands notice that you have a passport and obtain the visas for you. You don't have to perform the transactions yourself.
Another analogy for the ticket-granting ticket is that of a three-day ski pass that is good at four different ski resorts. You show the pass at whichever resort you decide to go to and you receive a lift ticket for that resort, as long as the pass has not expired. Once you have the lift ticket, you can ski all you want at that resort. If you go to another resort the next day, you once again show your pass, and you get an additional lift ticket for the new resort. The difference is that the Kerberos-based commands notice that you have the weekend ski pass, and they get the lift ticket for you. So you don't have to perform the transactions yourself.
The KDC creates a ticket–granting ticket and sends it back, in encrypted form, to the client. The client decrypts the ticket-granting ticket by using the client's password.
Now in possession of a valid ticket-granting ticket, the client can request tickets for all sorts of network operations, such as rlogin or telnet, for as long as the ticket-granting ticket lasts. This ticket usually lasts for a few hours. Each time the client performs a unique network operation, it requests a ticket for that operation from the KDC.
Subsequent Kerberos Authentications
After the client has received the initial authentication, each subsequent authentication follows the
pattern that is shown in the following figure.
Figure 21-2 Obtaining Access to a Service Using Kerberos Authentication
The client requests a ticket for a particular service, for example, to remote log in to another machine, from the KDC by sending the KDC its ticket-granting ticket as proof of identity.
The KDC sends the ticket for the specific service to the client.
For example, suppose user joe wants to access an NFS file system that has been shared with krb5 authentication required. Because he is already authenticated (that is, he already has a ticket-granting ticket), as he attempts to access the files, the NFS client system automatically and transparently obtains a ticket from the KDC for the NFS service.
For example, suppose the user joe uses rlogin on the server boston. Because he is already authenticated, that is, he already has a ticket-granting ticket, he automatically and transparently obtains a ticket as part of the rlogin command. This ticket allows him to remote log in to boston as often as he wants until the ticket expires. If joe wants to remote log in to the machine denver, he obtains another ticket, as in Step 1.
The client sends the ticket to the server.
When using the NFS service, the NFS client automatically and transparently sends the ticket for the NFS service to the NFS server.
The server allows the client access.
These steps make it appear that the server doesn't ever communicate with the
KDC. The server does, though; it registers itself with the KDC, just as
the first client does. For simplicity's sake, that part has been left
out.
The Kerberos Remote Applications
The Kerberos-based (or “Kerberized”) commands that a user such as joe can use
are the following:
ftp
rcp
rdist
rlogin
rsh
ssh
telnet
These applications are the same as the Solaris applications of the same name.
However, they have been extended to use Kerberos principals to authenticate transactions, thereby
providing Kerberos-based security. See Kerberos Principals for information on principals.
These commands are discussed further in Kerberos User Commands.
Kerberos Principals
A client in the Kerberos service is identified by its principal. A principal
is a unique identity to which the KDC can assign tickets. A
principal can be a user, such as joe, or a service, such as
nfs or telnet.
By convention, a principal name is divided into three components: the primary,
the instance, and the realm. A typical Kerberos principal would be, for example,
joe/[email protected]. In this example:
joe is the primary. The primary can be a user name, as shown here, or a service, such as nfs. The primary can also be the word host, which signifies that this principal is a service principal that is set up to provide various network services, ftp, rcp, rlogin, and so on.
admin is the instance. An instance is optional in the case of user principals, but it is required for service principals. For example, if the user joe sometimes acts as a system administrator, he can use joe/admin to distinguish himself from his usual user identity. Likewise, if joe has accounts on two different hosts, he can use two principal names with different instances, for example, joe/denver.example.com and joe/boston.example.com. Notice that the Kerberos service treats joe and joe/admin as two completely different principals.
In the case of a service principal, the instance is the fully qualified host name. bigmachine.eng.example.com is an example of such an instance. The primary/instance for this example might be ftp/bigmachine.eng.example.com or host/bigmachine.eng.example.com.
ENG.EXAMPLE.COM is the Kerberos realm. Realms are discussed in Kerberos Realms.
The following are all valid principal names:
Kerberos Realms
A realm is a logical network, similar to a domain, that defines a
group of systems under the same master KDC. Figure 21-3 shows how realms can relate
to one another. Some realms are hierarchical, where one realm is a superset
of the other realm. Otherwise, the realms are nonhierarchical (or “direct”) and the
mapping between the two realms must be defined. A feature of the
Kerberos service is that it permits authentication across realms. Each realm only needs to
have a principal entry for the other realm in its KDC. This
Kerberos feature is called cross-realm authentication.
Figure 21-3 Kerberos Realms
Kerberos Servers
Each realm must include a server that maintains the master copy of
the principal database. This server is called the master KDC server. Additionally, each realm should contain
at least one slave KDC server, which contains duplicate copies of the principal database. Both
the master KDC server and the slave KDC server create tickets that are
used to establish authentication.
The realm can also include a Kerberos application server. This server provides
access to Kerberized services (such as ftp, telnet, rsh and NFS).
If you have installed SEAM 1.0 or 1.0.1, the realm might include a
Kerberos network application server, but this software was not included with these releases.
The following figure shows what a hypothetical realm might contain.
Figure 21-4 A Typical Kerberos Realm