Archive

Posts Tagged ‘kerberos’

Understanding HTTP Pipelining and Connection Jumping

August 10th, 2013 No comments

Browsers can setup two or more TCP connections to an HTTP server to facilitate parallel downloads. As the browser parses the Web page it is aware of which objects it needs to download.

Rather than send the requests in series over a single connection, the requests are sent over parallel connections to enable faster downloading of the Web page. Another technique used by browsers to improve the performance is “HTTP pipelining”. Read more…

Kerberos (RFC1510) Failure Codes

April 18th, 2011 No comments

These failure codes are the original error codes from the Kerberos RFC 1510 Read more…

Categories: Network Management Tags:

Kerberos Realms Usage

November 18th, 2010 No comments

In order to authenticate against Kerberos realms and perform remote administration, the system must have the krb5-workstation package installed. Read more…

Categories: Unix(*nix) Tags: ,

How Kerberos Works

November 9th, 2010 No comments

Kerberos1The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s.

It was part of a project called Athena that involved integrating the computers on the MIT campus, which ran on different operating systems, in a network that offered single sign-on (SSO).

At that time, most UNIX systems allowed users to access their resources as long as they had an account name and password. Read more…