Answer the question
In order to leave comments, you need to log in
How does the Kerberos protocol work?
Explain how the Kerberos protocol works. With this scheme, there is a server DC(kerberos server) + File server + User computer - if the user received a ticket to access the File server using the TGT ticket, then in this case between the File server and the User how is the traffic encrypted with which key? If the traffic between the File server and the user is encrypted using the user's password hash, then how will the File server decrypt the traffic, since it does not know the user's hash (that is, the password)?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question