2019/Kerberos
From SIPB Cluedumps
(Difference between revisions)
Line 5: | Line 5: | ||
|location=3-370 | |location=3-370 | ||
|abstract=What is Kerberos, and how does it work? What really happens when I type `kinit`? How does a single sign-on system work? What's the difference between authentication and authorization? (And possibly related: what's with all these "permission denied" errors?) How do I use Kerberos in my projects too? And what's "cutting edge" in this technology from the 80s that keeps it in heavy use today?}} | |abstract=What is Kerberos, and how does it work? What really happens when I type `kinit`? How does a single sign-on system work? What's the difference between authentication and authorization? (And possibly related: what's with all these "permission denied" errors?) How do I use Kerberos in my projects too? And what's "cutting edge" in this technology from the 80s that keeps it in heavy use today?}} | ||
+ | |||
+ | Slides: [http://cluedumps.mit.edu/w/images/3/36/Kerberos_2019_talk_slides.pdf] |
Revision as of 06:17, 20 December 2019
[edit] Kerberos: An Introduction from the Underworld Up
Date: December 5, 2019, at 7:30 PM |
Presenters: Robbie Harwood |
Location: 3-370 |
Abstract: What is Kerberos, and how does it work? What really happens when I type `kinit`? How does a single sign-on system work? What's the difference between authentication and authorization? (And possibly related: what's with all these "permission denied" errors?) How do I use Kerberos in my projects too? And what's "cutting edge" in this technology from the 80s that keeps it in heavy use today? |
Slides: [1]