• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 10
  • 7
  • 7
  • 5
  • 1
  • Tagged with
  • 46
  • 16
  • 16
  • 15
  • 14
  • 13
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

AFS-Kerberos5-Migration

Schulze, Norman 25 October 1998 (has links) (PDF)
In dieser Arbeit wird die Migration von AFS-kaserver (Kerberos V4) zu Kerberos V5 untersucht. Dabei wird die frei verfügbare Kerberos5-Implementation ¨Heimdal¨ benutzt. Es werden die Unterschiede der Kerberos- Versionen dargestellt und daraus die zur Migration notwendigen Schritte abgeleitet und am Beispiel einer AFS-Zelle beschrieben.
2

Vom AFS-kaserver zu Kerberos V5

Müller, Thomas 27 April 2004 (has links) (PDF)
Workshop "Netz- und Service-Infrastrukturen" Der Vortrag beschreibt das Vorgehen bei der Umstellung des Authentication Services im URZ der TU Chemnitz. Seit 1994 wird der AFS kaserver betrieben und soll nun durch eine Kerberos V5 Installation ersetzt werden. Es erfolgt eine Analyse der Auswirkungen auf verschiedene Anwendungen und eine Auswahl zwischen den beiden verfügbaren Implementationen MIT Kerberos V5 und KTH Heimdal.
3

Laboration för Administration av UNIX-lika system : LDAP och Kerberos

Sellstedt, Daniel January 2016 (has links)
Syftet med detta arbete har varit att utforma enlaborationsinstruktion som förmedlar teori och kunskap omframförallt Kerberos, ett autentiseringssystem, och LDAP, enkatalogsystem. Arbetet försökte även bena ut vilka LDAPservrarsom är de vanligast förekommande bland företag ochorganisationer. Rapporten börjar med att behandla den teorisom krävs för att kunna implementera ett system somautentiserar användare via Kerberos och som tillhandahålleranvändarinformation via LDAP samt hur dessa kan kopplastill olika tjänster.Med hjälp av teorin implementerades ett system i virtuellmiljö med Ubuntu och utifrån denna implementation samtteorin utformades en laborationsinstruktion kring ämnet. Enenkät kring vilken LDAP-server som används på detillfrågades företag skapades och skickades ut tillslumpmässigt utvalda företag och visade att alla de tillfrågadeanvände sig av Microsofts Active Directory. Den visade ävenatt en tredjedel av de tillfrågade använde sig av Open Sourcevarianterav LDAP som just detta arbete fokuserar på.Slutligen konstateras att LDAP är den huvudsakligafokuspunkten för teorin och att om studenterna får grepp omLDAPs utformning och struktur faller många av de övrigabitarna på plats och underlättar förståelsen när de senareimplementerar systemet i praktiken. / The aim of this work has been to design a laboratoryassignment that conveys the theory and knowledge ofparticularly Kerberos, an authentication system, and LDAP,a directory system. The work also tried to sort out whichLDAP servers that are the most common among businessesand organizations. This work begins with treating the theoryrequired to implement a system that authenticates the uservia Kerberos and provides user information via LDAP andhow these can be linked to different services. With thisknowledge I implemented a system in a virtual environmentwith Ubuntu and based on this implementation as well astheory, designed a laboratory assigment on the subject. Aquestionnaire on which LDAP servers that are used by thequestioned companies were created and sent out torandomly selected companies and showed that allrespondents used Microsoft Active Directory. It also showedthat one third of respondents used the Open Source versionsof LDAP that this report focuses on. Finally the the reportconcludes that LDAP is the main focal point of the theory,and that if the students get a grip on LDAPs layout andstructure many of the other pieces will fall in place andfacilitate understanding when they later implement thesystem in practice.
4

Sada testů na výkon MIT Kerberosu / Performance Test Suite for MIT Kerberos

Špaček, Petr January 2012 (has links)
Tato práce se zaměřuje na vyvinutí nástrojů pro výkonnostní testování, které umožní otestovat infrastrukturu systému MIT Kerberos, zjistit její výkonnostní charakteristiky a detekovat potenciální problémy. Práce shrnuje teoretické základy protokolu Kerberos a analyzuje potenciální výkonnostní problémy v různých konfiguracích MIT Kerberosu. Dále práce obsahuje popis návrhu a implementace sady nástrojů pro distribuované testování. Pomocí implementovaných nástrojů bylo odhaleno několik výkonnostních problémů, které jsou v práci popsány spolu s návrhem jejich řešení.
5

Single sign-on : Kerberos i webbapplikationer

Gustafsson Westman, Hans January 2010 (has links)
<p>Detta arbete undersöker ett par olika tekniker för att implementera single sign on med Kerberos i webbapplikationer. Undersökningen har gjorts på HTTP-autentisering som bygger på Microsofts NegotiateAuth och Cosign från University of Michigan. Dessa två tekniker har undersökts för att se hur de står sig mot varandra på kriterier såsom komplexitet, arbetsinsats och mjukvarukrav.Resultatet visar att HTTP-autentisering är väldigt simpel att implementera men kräver dock att användarens webbläsare konfigureras för den. Cosign är mer komplext men använder sig av Cookies vilket gör att de flesta webbläsare stödjer tekniken utan extra konfiguration.</p>
6

Föderiertes Identitätsmanagement / Federated identity management

Hübner, Uwe 27 April 2004 (has links)
Identities should be established independent of limitations by organization or application. We consider mobile and/or remote users and applications. Essential parts are centralized or distributed identity management systems. / Workshop "Netz- und Service-Infrastrukturen" Wünschenswert ist die Gültigkeit von Identitäten über Organisations- bzw. Applikationsgrenzen hinweg. Dabei werden mobile/entfernte Nutzer und Anwendungen betrachtet. Kernstück bilden zentrale oder verteilte Identitätsverwaltungen.
7

Comparing Remote Data Transfer Rates of Compact Muon Solenoid Jobs with Xrootd and Lustre

Kaganas, Gary H 01 April 2014 (has links)
To explore the feasibility of processing Compact Muon Solenoid (CMS) analysis jobs across the wide area network, the FIU CMS Tier-3 center and the Florida CMS Tier-2 center designed a remote data access strategy. A Kerberized Lustre test bed was installed at the Tier-2 with the design to provide storage resources to private-facing worker nodes at the Tier-3. However, the Kerberos security layer is not capable of authenticating resources behind a private network. As a remedy, an xrootd server on a public-facing node at the Tier-3 was installed to export the file system to the private-facing worker nodes. We report the performance of CMS analysis jobs processed by the Tier-3 worker nodes accessing data from a Kerberized Lustre file. The processing performance of this configuration is benchmarked against a direct connection to the Lustre file system, and separately, where the xrootd server is near the Lustre file system.
8

Konfigurace SSO ve vnitropodnikové síti proti Active Directory / Configuration of Single Sign On against Active Directory in enterprise network

Křenek, Jan January 2013 (has links)
This work discusses about configuration and integration of Single Sign On against to Active Directory which serves as an authorization into web applications for Air Navigation Services, CZECH REPUBLIC by company Ifield Computer Consultancy Limited. Part of the work is performed the results of testing of the performance these two type of implementations for two different applications. For the theory part I've been using relevant literature, but for some tools, namely Scimark and JMeter, there is none, so I had to settle with internet sources. The main benefit of this thesis is the result of testing of comparison two different implementations of the Single Sign On generated using NTLMv2 and SPNEGO/Kerberos.
9

Single sign-on v J2EE webových aplikacích založené na protokolu SPNEGO/Kerberos / Single Sign-On in J2EE Web Applications Based on SPNEGO/Kerberos

Nečas, Tomáš Unknown Date (has links)
The dissertation deals with requirements, analysis, description and integration of Single Sign-On solution based on SPNEGO/Kerberos protocol. The thesis provides an overview of the Single Sign-On basic principles and concepts and deals with the Kerberos authentication mechanism in more detail. After introducing the fundaments of the Kerberos protocol, its terminology and common implementations, attention is focused on the services and settings of Microsoft Kerberos implementation in Windows 2000/2003 environment. An authentication solution demonstration is performed on J2EE platform using the authentication filter and plug-in. The thesis also includes a brief overview of integrating the Single Sign-On solution into different architectures of corporate information systems and describes the implementation process of this solution. In conclusion, the usability of Kerberos Single Sign-On solution in today's business sector is analysed.
10

Extensible Pre-Authentication in Kerberos

Hellewell, Phillip L. 03 July 2007 (has links) (PDF)
Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provisioning outsiders that is secure, flexible, efficient, scalable, and easy to manage. Kerberos is a secure, industry-standard protocol. Currently, Kerberos operates as a closed system; all users must be specified upfront and managed on an individual basis. This paper presents EPAK (Extensible Pre-Authentication in Kerberos), a framework that enables Kerberos to operate as an open system. Implemented as a Kerberos extension, EPAK enables many authentication schemes to be loosely coupled with Kerberos, without further modification to Kerberos. EPAK provides the mutual benefits of enhancing the flexibility of Kerberos and increasing the viability of alternate authentication systems as they move to the enterprise.

Page generated in 0.0431 seconds