SlideShare a Scribd company logo
___________________
         _
     KERBEROS



                    By-
          •Presented

                 Sudeep Shouche
          •Guided By-

                 Ms. Vaishali Jetly
INDEX_____________________________
___
 Introduction

 History   & Development
 Need

 Needham-Schroeder    Protocol
 Working

 Applications

 Weakness
INTRODUCTION_______________________
_
• Kerberos: Network security protocol

• Part of project Athena (MIT).

• Uses trusted 3rd party authentication
 scheme.

• Assumes that hosts are not trustworthy.
INTRODUCTION_______________________
_
• Requires that each client (each request for
 service) prove it’s identity.

• Does not require user to enter password
 every time a service is requested!

• Uses Needham-Schroeder Algorithm.
HISTORY & DEVELOPMENT______________
 SteveMiller and Clifford Neuman designed the
 primary Kerberos version.

 Versions 1–3 occurred only internally at MIT as
 part of project Athena.

 Windows2000 was Microsoft's first system to
 implement Kerberos security standard.

 Version
       5, designed by John Kohl and Clifford
 Neuman, appeared in 1993 .
HISTORY & DEVELOPMENT______________
Recent updates include:
 Encryption and Checksum Specifications.



 Clarification
             of the protocol with more
 detailed and clearer explanation of intended
 use.

A new edition of the GSS-API( Generic
 Security Service Application Program
 Interface ) specification.
NEED
________________________________
    Authentication-
•

        divide up resources with capabilities between many
    o
        users
        restrict user’s access to resources.
    o

        typical authentication mechanism – passwords.
    o

    But regular password authentication is
•
    useless in the face of a computer network
    (as in the Internet)
        systems crackers (hacker) can easily intercept these
    o
        passwords while on the wire.
NEED______________________________
___
 Firewalls  make a risky assumption: that
 attackers are coming from the outside. In
 reality, attacks frequently come from within.
      Assumes “bad guys” are on the outside….while
  o
      the really damaging ones can be inside !!
      Restrict use of Internet.
  o


 Kerberos assumes that network connections
 (rather than servers and work stations) are
 the weak link in network security.
NEEDHAM-SCHROEDER PROTOCOL_______
 TheNeedham-Schroeder Symmetric Key
 establishes a session key to protect further
 communication.

 TheNeedham-Schroeder Public-Key
 Protocol provides mutual authentication.
NEEDHAM-SCHROEDER SYMMETRIC KEY
PROTOCOL__________________________
__
 Let
    Alice (A) initiates the communication to
 Bob (B).
    S is a server trusted by both parties
  
   KAS is a symmetric key known only to A and S
   KBS is a symmetric key known only to B and S
   NA and NB are nonces
NEEDHAM-SCHROEDER SYMMETRIC KEY
PROTOCOL__________________________
__
 A      S: A, B, NA

 S     A: {NA, KAB, B, {KAB, A} KBS} KAS

 A     B: {KAB, A} KBS

 B    A: {NB} KAB

 A     B: {NB -1} KAB
NEEDHAM-SCHROEDER PUBLIC KEY
PROTOCOL__________________________
__
 Alice(A) and Bob (B) use a trusted server (S)
 to distribute public keys on request. These keys
 are:
         KPA & KSA, public and private halves of an encryption
     
         key-pair belonging to A.

         KPB & KSB, similar belonging to B.
     



         KPS & KSS, similar belonging to S.
     




Note : KSS is used to encrypt while KPS to
 decrypt.
NEEDHAM-SCHROEDER PUBLIC KEY
PROTOCOL__________________________
__
 A      S: A, B

 S      A: {KPB, B} KSS

 A      B: {NA , A } KPB

 B      S: B, A

 S      B: {KPA, A} KSS

 B      A: {NA , NB} KPA

 A      B: {NB } KPB
ATTACK ON NEEDHAM-SCHROEDER
PROTOCOL__________________________
__
 A      I: {NA , A } KPI

 I      B: {NA , A } KPB

 B      I: {NA , NB} KPA

 I      A: {NA , NB} KPA

 A      I: {NB} KPI

 I      B: {NB} KPB
ATTACK ON NEEDHAM-SCHROEDER
PROTOCOL__________________________
__
 Replace :
 B       A: {NA, NB} KPA

 With
 B A: {NA , NB, B}KPA


   The attack was first described by Gavin Lowe
   in 1995.He also proposed the above
   mentioned fix.
WORKING___________________________
__
WORKING___________________________
__
 Abbreviations Used:
    AS    Authentication Server.


       KDC Key Distribution Center.
   




       TGS Ticket Granting Server.
   




       SS    Service Server.
   




       TGT   Ticket Granting Ticket.
   
WORKING___________________________
__
User Client-based Logon Steps:
 A user enters a username and password on client
  machine.

    The client performs a one-way function on the

    entered password, and this becomes the secret key
    of the client/user.
WORKING___________________________
__
Client Authentication Steps:
 The client sends a message to AS requesting
  services on behalf of the user.

    If client is in Database, AS sends back message

    which Client decrypts to obtain the Client/TGS
    Session Key for further communications with TGS.
WORKING___________________________
__
Client Service Authorization Steps:
 Client sends messages to TGS to get quot;client/TGS
  session key” using TGS secret key and sends
  following two messages to the client:
       Client-to-server ticket encrypted using the

        service's secret key.

         Client/server session key encrypted with the
     

         Client/TGS Session Key.
WORKING___________________________
__
Client Service Request Steps:
 The client now can authenticate itself to the SS.



    The SS decrypts ticket to ultimately retrieve

    Authenticator and sends confirmation to client.

    Client decrypts the confirmation using the

    Client/Server Session Key and connection is set up.
APPLICATIONS_______________________
__
 Authentication

 Authorization

 Confidentiality

 Within   networks and small sets of networks
WEAKNESS
___________________________
 Single  point of failure.
 Requires synchronization of involved
  host’s clocks.
 The administration protocol is not
  standardized.
 Compromise of central server will
  compromise all users' secret keys. If
  stolen, TGT can be used to access
  network services of others.
THANK YOU

More Related Content

What's hot (20)

Kerberos
KerberosKerberos
Kerberos
 
SSL
SSLSSL
SSL
 
Kerberos ppt
Kerberos pptKerberos ppt
Kerberos ppt
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
IP Security
IP SecurityIP Security
IP Security
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Web Security
Web SecurityWeb Security
Web Security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
S/MIME
S/MIMES/MIME
S/MIME
 

Similar to Kerberos

how to develop a serverless in-app notification system - beSharp serverlessda...
how to develop a serverless in-app notification system - beSharp serverlessda...how to develop a serverless in-app notification system - beSharp serverlessda...
how to develop a serverless in-app notification system - beSharp serverlessda...beSharp
 
Raymond Kuiper - Working the API like a Unix Pro
Raymond Kuiper - Working the API like a Unix ProRaymond Kuiper - Working the API like a Unix Pro
Raymond Kuiper - Working the API like a Unix ProZabbix
 
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdf
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdftips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdf
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdfssuser47d3271
 
Static Typing in Vault
Static Typing in VaultStatic Typing in Vault
Static Typing in VaultGlynnForrest
 
NodeConf OneShot Budapest — Production Ready Node.js by Nuno Job
NodeConf OneShot Budapest — Production Ready Node.js by Nuno JobNodeConf OneShot Budapest — Production Ready Node.js by Nuno Job
NodeConf OneShot Budapest — Production Ready Node.js by Nuno JobNuno Job
 
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017Amazon Web Services
 
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...IJNSA Journal
 
Matt Allen - Unfuddle your bugs
Matt Allen - Unfuddle your bugsMatt Allen - Unfuddle your bugs
Matt Allen - Unfuddle your bugsTim Lucas
 
.NET DEVELOPER
.NET DEVELOPER.NET DEVELOPER
.NET DEVELOPERvinaykeith
 
.NET DEVELOPER
.NET DEVELOPER.NET DEVELOPER
.NET DEVELOPERvinaykeith
 
Slides: Moving from a Relational Model to NoSQL
Slides: Moving from a Relational Model to NoSQLSlides: Moving from a Relational Model to NoSQL
Slides: Moving from a Relational Model to NoSQLDATAVERSITY
 
Micro-service architectures with Gilmour
Micro-service architectures with GilmourMicro-service architectures with Gilmour
Micro-service architectures with GilmourAditya Godbole
 
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...marcja
 
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...Fastly
 
Node.js API 서버 성능 개선기
Node.js API 서버 성능 개선기Node.js API 서버 성능 개선기
Node.js API 서버 성능 개선기JeongHun Byeon
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackRajeev Chauhan
 
MongoDB Stitch Introduction
MongoDB Stitch IntroductionMongoDB Stitch Introduction
MongoDB Stitch IntroductionMongoDB
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh rajDBNCOET
 

Similar to Kerberos (20)

how to develop a serverless in-app notification system - beSharp serverlessda...
how to develop a serverless in-app notification system - beSharp serverlessda...how to develop a serverless in-app notification system - beSharp serverlessda...
how to develop a serverless in-app notification system - beSharp serverlessda...
 
Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC
Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC
Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC
 
Raymond Kuiper - Working the API like a Unix Pro
Raymond Kuiper - Working the API like a Unix ProRaymond Kuiper - Working the API like a Unix Pro
Raymond Kuiper - Working the API like a Unix Pro
 
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdf
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdftips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdf
tips_breakout-airheads-macau-2013-top-10-tips-from-aruba-tac.pdf
 
Static Typing in Vault
Static Typing in VaultStatic Typing in Vault
Static Typing in Vault
 
NodeConf OneShot Budapest — Production Ready Node.js by Nuno Job
NodeConf OneShot Budapest — Production Ready Node.js by Nuno JobNodeConf OneShot Budapest — Production Ready Node.js by Nuno Job
NodeConf OneShot Budapest — Production Ready Node.js by Nuno Job
 
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017
Container Networking Deep Dive with Amazon ECS - CON401 - re:Invent 2017
 
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIP...
 
Matt Allen - Unfuddle your bugs
Matt Allen - Unfuddle your bugsMatt Allen - Unfuddle your bugs
Matt Allen - Unfuddle your bugs
 
.NET DEVELOPER
.NET DEVELOPER.NET DEVELOPER
.NET DEVELOPER
 
.NET DEVELOPER
.NET DEVELOPER.NET DEVELOPER
.NET DEVELOPER
 
Slides: Moving from a Relational Model to NoSQL
Slides: Moving from a Relational Model to NoSQLSlides: Moving from a Relational Model to NoSQL
Slides: Moving from a Relational Model to NoSQL
 
Micro-service architectures with Gilmour
Micro-service architectures with GilmourMicro-service architectures with Gilmour
Micro-service architectures with Gilmour
 
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...
Distributed Caches: A Developer’s Guide to Unleashing Your Data in High-Perfo...
 
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...
Altitude SF 2017: Fastly GSLB: Scaling your microservice and multi-cloud envi...
 
Node.js API 서버 성능 개선기
Node.js API 서버 성능 개선기Node.js API 서버 성능 개선기
Node.js API 서버 성능 개선기
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing Attack
 
MongoDB Stitch Introduction
MongoDB Stitch IntroductionMongoDB Stitch Introduction
MongoDB Stitch Introduction
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
 
Rpc
RpcRpc
Rpc
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Kerberos