SlideShare a Scribd company logo
Kerberos
In Greek mythology, a many headed dog, the
guardian of the entrance of Hades
Example of Kerberos Idea
A
C
B
Now I can deal
with A by using
our shared key
• Kerberos is a protocol for authenticating service
requests between trusted hosts across an
untrusted network, such as the internet.
• Kerberos is built in to all major operating
systems, including Microsoft Windows, Apple
OS X, FreeBSD and Linux.
Kerberos Protocol XYZService
KeyDistributionCenter(KDC)
1.Generate Session Key
2. Create XYZ credential ticket
a. Encrypt with XYZ service key
(Password).
b. Create message(Current date time,
Session key).
3. Create User Response
a. Create message(Current date time,
Session XYZ credential ticket )
b. Encrypt with user key (Password)
1.Decrypt the response using
user key(password).
2.save the session key to be
used for any communication
to XYZ service .
3.Pass the service credential
ticket to the XYZ service
KeyDistributionCenter(KDC)
XYZservice
Kerberos Protocol
1. Decrypt the response using
XYZ service key (password).
2. Save the session key to be
used for any communication
to the user.
3. Send successful response
encrypted with the session
key .
1. First service access is Ticket Granting Service (TGS)
service to get Ticket Granting Ticket (TGT)
a. Single sign on
b. Allow user to use biometric, finger print and smart
card .
2. If we considered that user is delegated by the KDC to
XYZ service, with the same concept the user can delegate
XYZ service to deal with another service on behalf of
him.
Kerberos Protocol
KeyDistribution
Center(KDC)
Authentication
service(AS)
Ticket Granting
Service (TGS)
Public Key Infrastructure (PKI)
Binds public keys to entities , enables other entities to verify
public key bindings, Provides services for management of
keys in a distributed system
Goals:
protect and distribute information that is needed in a widely
distributed environment, where the users, resources and stake-
holders may all be in different places at different times
PKI-Public Key Infrastructure-PKI
1.How can we transfer public key /File Format?
PKI-Public Key Infrastructure-PKI
2. Who Create/Generate this Certificate
1.How can we transfer public key /File Format?
1. How can you trust this certificate ?
2.Does this site really belong to ..?
A trust B
B trust C
Then A will trust C
Certificateauthority(CA)
Trust
TrustedCA
Trust
Public
Certificateauthority(CA)
TrustedCA
PKI-Public Key Infrastructure-PKI
Public key
3.Does this certificate really generated by a Trusted CA?
Digital
signature(DS)
PKI-Public Key Infrastructure-PKI
Certificateauthority(CA)
TrustedCA
Issue Policy and Methods Distribution policy and Method
Certificate
Backup
How to know google chrome certificates
Choose
advanced
settings
then choose
certificates
This page will appear
it has all certificates
classified
Choose any tap you
want to see
Here I choose the first
certificate, and what
appeared is the
certificate itself.
It shows the what it is
used for, the publisher
and dates.
Alternatives
Web of trust
An alternative approach to the problem of public authentication
of public key information is the web-of-trust scheme, which uses
self-signed certificates and a trusted third party for those
certificates.
Examples :
oPGP (Pretty Good Privacy)
oOpenPGP
The web of trust concept was first put by PGP creator Phil
Zimmermann in 1992 for PGP
PGP company owned the rights to the original PGP
encryption software. released in 1991 to ensure the security
of files that were posted on internet From 1997 until 2010,
the software changed several times until it was Bought by
Symantec Corp., who continues to develop the PGP.
PGP encryption uses a combination of encryption
methodologies such as hashing, data compression,
symmetric-key cryptography and public key cryptography.
PGP allow the use of e-mail digital signatures for self-
publication of public key information, this what make it
easy.
Zimmerman soon began work on an openPGP (open-
source version of PGP) encryption that uses encryption
algorithms that had no licensing issues.
Alternatives
Simple Public Key Infrastructure
public key certificate format, associated signature and key
acquisition protocols are to be simple to understand,
implement, and use. The resulting formats and protocols are to
be known as the Simple Public Key Infrastructure, or SPKI.
The SPKI is intended to provide mechanisms to support
security in a wide range of internet applications as electronic
mail and WWW documents, payment protocols, and any other
application which will require the use of public key
certificates.
What is Digital Identity ?
Digital Identity : The electronic representation of
an entity within a domain of application.
Entity : A person, a group of persons, an
organization or even a device that is capable of
doing a transaction.
Domain Of Application : The area of application
where a digital identity has its validity
Identifiers :A digital identity is composed of
identifiers or attributes. Examples are Date Of
Birth, ID.
Credentials : It is anything a user can possess.
Examples are a password, answer to a question,
his eye or his voice
Federated identity management
using the same set of standards across different organizations to
manage users identity.
With the increased integration of Internet in our life users,
suppliers, retailers all are accessing services of many
organizations to increase their business and get the best of what is
available, but one organization does not trust the identities of
another organization.
So the user ends up making several user-IDs and passwords.
This is very inefficient, costly and not at all user friendly. FIM
provides standards that help the identities to cross organizational
boundaries and to be shared by many organizations. FIM allows
the subscriber to use the same identity to access networks of
different organizations. Some of the first adopters of FIM were
Boeing, General Motors and Nokia
Identity Management Evolution : Identity Management
(IM) refers to procedure of handling the lifecycle of a
digital identity its creation, maintenance and deleting a
digital identity. IM has to also deal with authentication
procedure and access control policy.
Identity Provider (IDP) is a service or an organization
that is responsible for authentication of user.
Single Sign On (SSO) is a process where user gains
access to several services after successful authentication .
FIM challenges
Although progress have been made in FIM but there are some
challenges that are faced by FIM. They are as follows :
Identity theft : the theft of an identity represents one of the main
issues as it remains undetected till the damage has been done. In most
of the cases identity theft does not occur at the Identity Provider. It
mostly occurs on the users end.
FIM challenges
Privacy guarantee and legal compliance :
In some countries there are laws to protect users personal
information against bad use. The current FIM have weak
definitions in how a user should protect is personal information.
A standard is proposed by W3C for websites to tell their practices
of personal information collection, use and distribution. These
policies should be read by the web browser or the user and must
be accepted.
Peer To Peer (P2P) application :
Support Use of P2P applications
has increased very fast. FIM use
in P2P environment will provide
more security but FIM is based
on client/server model.
*note: client/server model
which the client makes a service
request and the server fulfills
the request, the P2P network
model allows each node to
function as both a client and
server.
Thank you for your attention !!
This presentation by :
Wafa Al-salman
Sara Al-sughaeir

More Related Content

What's hot

Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Shubham Sharma
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
Evernym
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Evernym
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
Paul Trevithick
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
Kaliya "Identity Woman" Young
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
Oliver Pfaff
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
Alex de Jong
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
Synacts
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
Devam Shah
 

What's hot (20)

Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 

Similar to Kerberos-PKI-Federated identity

Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
Maganathin Veeraragaloo
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
Pixlogix Infotech
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Avirot Mitamura
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
Anvesh Vision Private Limited
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
Nis
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
PROIDEA
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
Brian Spector
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Loqr
LoqrLoqr

Similar to Kerberos-PKI-Federated identity (20)

Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
120 i143
120 i143120 i143
120 i143
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Loqr
LoqrLoqr
Loqr
 

Recently uploaded

3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
David Osipyan
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
fafyfskhan251kmf
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
ronaldlakony0
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Wasswaderrick3
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
zeex60
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
moosaasad1975
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
kejapriya1
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 

Recently uploaded (20)

3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 

Kerberos-PKI-Federated identity

  • 1. Kerberos In Greek mythology, a many headed dog, the guardian of the entrance of Hades
  • 2. Example of Kerberos Idea A C B Now I can deal with A by using our shared key
  • 3. • Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. • Kerberos is built in to all major operating systems, including Microsoft Windows, Apple OS X, FreeBSD and Linux.
  • 4. Kerberos Protocol XYZService KeyDistributionCenter(KDC) 1.Generate Session Key 2. Create XYZ credential ticket a. Encrypt with XYZ service key (Password). b. Create message(Current date time, Session key). 3. Create User Response a. Create message(Current date time, Session XYZ credential ticket ) b. Encrypt with user key (Password) 1.Decrypt the response using user key(password). 2.save the session key to be used for any communication to XYZ service . 3.Pass the service credential ticket to the XYZ service
  • 5. KeyDistributionCenter(KDC) XYZservice Kerberos Protocol 1. Decrypt the response using XYZ service key (password). 2. Save the session key to be used for any communication to the user. 3. Send successful response encrypted with the session key .
  • 6. 1. First service access is Ticket Granting Service (TGS) service to get Ticket Granting Ticket (TGT) a. Single sign on b. Allow user to use biometric, finger print and smart card . 2. If we considered that user is delegated by the KDC to XYZ service, with the same concept the user can delegate XYZ service to deal with another service on behalf of him. Kerberos Protocol KeyDistribution Center(KDC) Authentication service(AS) Ticket Granting Service (TGS)
  • 7. Public Key Infrastructure (PKI) Binds public keys to entities , enables other entities to verify public key bindings, Provides services for management of keys in a distributed system Goals: protect and distribute information that is needed in a widely distributed environment, where the users, resources and stake- holders may all be in different places at different times
  • 8. PKI-Public Key Infrastructure-PKI 1.How can we transfer public key /File Format?
  • 9. PKI-Public Key Infrastructure-PKI 2. Who Create/Generate this Certificate 1.How can we transfer public key /File Format? 1. How can you trust this certificate ? 2.Does this site really belong to ..? A trust B B trust C Then A will trust C Certificateauthority(CA) Trust TrustedCA Trust Public
  • 10. Certificateauthority(CA) TrustedCA PKI-Public Key Infrastructure-PKI Public key 3.Does this certificate really generated by a Trusted CA? Digital signature(DS)
  • 11. PKI-Public Key Infrastructure-PKI Certificateauthority(CA) TrustedCA Issue Policy and Methods Distribution policy and Method Certificate Backup
  • 12. How to know google chrome certificates
  • 14. This page will appear it has all certificates classified Choose any tap you want to see
  • 15. Here I choose the first certificate, and what appeared is the certificate itself. It shows the what it is used for, the publisher and dates.
  • 16. Alternatives Web of trust An alternative approach to the problem of public authentication of public key information is the web-of-trust scheme, which uses self-signed certificates and a trusted third party for those certificates. Examples : oPGP (Pretty Good Privacy) oOpenPGP
  • 17. The web of trust concept was first put by PGP creator Phil Zimmermann in 1992 for PGP PGP company owned the rights to the original PGP encryption software. released in 1991 to ensure the security of files that were posted on internet From 1997 until 2010, the software changed several times until it was Bought by Symantec Corp., who continues to develop the PGP. PGP encryption uses a combination of encryption methodologies such as hashing, data compression, symmetric-key cryptography and public key cryptography. PGP allow the use of e-mail digital signatures for self- publication of public key information, this what make it easy. Zimmerman soon began work on an openPGP (open- source version of PGP) encryption that uses encryption algorithms that had no licensing issues.
  • 18. Alternatives Simple Public Key Infrastructure public key certificate format, associated signature and key acquisition protocols are to be simple to understand, implement, and use. The resulting formats and protocols are to be known as the Simple Public Key Infrastructure, or SPKI. The SPKI is intended to provide mechanisms to support security in a wide range of internet applications as electronic mail and WWW documents, payment protocols, and any other application which will require the use of public key certificates.
  • 19. What is Digital Identity ? Digital Identity : The electronic representation of an entity within a domain of application. Entity : A person, a group of persons, an organization or even a device that is capable of doing a transaction. Domain Of Application : The area of application where a digital identity has its validity Identifiers :A digital identity is composed of identifiers or attributes. Examples are Date Of Birth, ID. Credentials : It is anything a user can possess. Examples are a password, answer to a question, his eye or his voice
  • 20. Federated identity management using the same set of standards across different organizations to manage users identity. With the increased integration of Internet in our life users, suppliers, retailers all are accessing services of many organizations to increase their business and get the best of what is available, but one organization does not trust the identities of another organization. So the user ends up making several user-IDs and passwords. This is very inefficient, costly and not at all user friendly. FIM provides standards that help the identities to cross organizational boundaries and to be shared by many organizations. FIM allows the subscriber to use the same identity to access networks of different organizations. Some of the first adopters of FIM were Boeing, General Motors and Nokia
  • 21.
  • 22. Identity Management Evolution : Identity Management (IM) refers to procedure of handling the lifecycle of a digital identity its creation, maintenance and deleting a digital identity. IM has to also deal with authentication procedure and access control policy. Identity Provider (IDP) is a service or an organization that is responsible for authentication of user. Single Sign On (SSO) is a process where user gains access to several services after successful authentication .
  • 23. FIM challenges Although progress have been made in FIM but there are some challenges that are faced by FIM. They are as follows : Identity theft : the theft of an identity represents one of the main issues as it remains undetected till the damage has been done. In most of the cases identity theft does not occur at the Identity Provider. It mostly occurs on the users end.
  • 24. FIM challenges Privacy guarantee and legal compliance : In some countries there are laws to protect users personal information against bad use. The current FIM have weak definitions in how a user should protect is personal information. A standard is proposed by W3C for websites to tell their practices of personal information collection, use and distribution. These policies should be read by the web browser or the user and must be accepted.
  • 25. Peer To Peer (P2P) application : Support Use of P2P applications has increased very fast. FIM use in P2P environment will provide more security but FIM is based on client/server model. *note: client/server model which the client makes a service request and the server fulfills the request, the P2P network model allows each node to function as both a client and server.
  • 26. Thank you for your attention !! This presentation by : Wafa Al-salman Sara Al-sughaeir