I want to learn for Hadoop security using kerberos. I have configured kerberos from this blog but don't know to work on that.
Give me any tutorial link or concept to understand it.
Here you find some help links;
Will edit my answer further , If I could find more details.
I will try to answer to question "How kerberos works?".
Client Authentication with Authentication server (AS)
Message A : {Client to AS session key} encrypted using secret key of the client(taken from database)
Message B : {Client Id, Client to AS session key, some other in formations} encrypted using AS secret key
Now client can decrypt Message A
and can get Client vs AS session key
using his secret key if he is the one who he claims to be. Now client has the session key and he can make service requests to the AS.
Client service authorization
Client to Service server(SS) Session key
Message C : {Message B, Id of the service}
Message D : {Client ID, Time stamp} encrypted using Client to AS session key
Client to AS session key
and Client ID
. Using the session key it will decrypt Message D and compare both Client ID
s. If it is same, Client is authenticated and will check Access control table for authorization for the specific service requested by client. If he is authorized to that service, It will prepare two messages and will send it to client.Message E : {Client ID, Client to SS session key, some other} encrypted by specific SS secret key
Message F : {Client to SS session key} encrypted using Client to AS Session key
Now client can decrypt Message F
using Client to SS Session key
and he will obtain Client to SS session key
.
Client Service Request
Client will connect to the Service server(SS) and do the following steps to receive the service
Message G : {Message E}
Message H : {Client ID, time stamp} encrypted using Client to SS session key
Message G
using its secret key (remember that AS encrypted Message E using the requested SS secret key) and can obtain Client ID and Client to SS session key
. SS will decrypt Message H
using obtained session key and will obtain Client ID from Message H
. Both client id from Message H
and Message G
will be compared and SS can authenticate the request if it is a match. Authentication also depend in the time stamp, client address and some other information based on the implementation. It is a very basic approach for kerberos protocol. For more information visit Wikipedia
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With