A SERVICE OF

logo

Security—How to Configure Kerberos Authentication
Security—How to Configure Kerberos Authentication
Kerberos provides strong authentication method for client/server applications by using
secret-key cryptography. Using this protocol, a client can prove its identity to a server (and
vice versa) across an insecure network connection. After a client and server use Kerberos to
prove their identity, they can encrypt all communications to assure privacy and data
integrity.
1. Select the Kerberos radio button to enable Kerberos authentication.
2. Click the Kerberos Configuration button to display a sub-screen for authentication
settings.
3. A realm name functions similarly to a DNS domain name. In theory, the realm name is
arbitrary; however, in practice a Kerberos realm is typically named using an uppercase
version of the DNS domain name that is associated with hosts in the realm. Specify a
realm name that is case-sensitive, for example, MYCOMPANY.COM.
4. Specify a Username for the Kerberos configuration.
5. Specify a Password for the Kerberos configuration.
The KDC (Key Distribution Center) implements an Authentication Service and a ticket
granting service, whereby an authorized user is granted a ticket that is encrypted with
the user’s password. The KDC has a copy of every user password.
6. Specify a server IP address and a port to be used as the Primary KDC.
7. Optionally, specify a Backup KDC server by providing the IP address and port.
8. Optionally, specify a Remote KDC server by providing the IP address and port.
9. Click OK when done.
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved 59
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004