Wednesday, May 12, 2010

Kerberos Authentication in Windows Server based IT Infrastructures

If you're reading this blog, you probably know what Kerberos is. (It is the native authentication protocol used in Microsoft Windows Server based IT infrastructures and it facilitates distributed security in these IT infrastuctures.)

In fact, without Kerberos authentication, single-sign-on would largely not be possible in a Windows Server based environment, and the thousands of distributed security accesses that organizational employees engage in every day, whether sending email, navigating to an intranet portal or accessing a file on a server, would largely be much harder and certainly not seamless.

In this blog, I plan to take a look at numerous vital aspects of Kerberos, so IT admins can better understand its importance, identify how to configure and manage it, and learn about some cool tips and tricks that could optimize performance and enhance security.

Should you have any questions, you can leave your question via a comment.



  1. This comment has been removed by the author.

  2. Hi Aaron,

    I think of Active Directory Security as being critical to business these days and Active Directory Auditing is very important.

    Personally, I've found that the need to audit what is being audited in Active Directory is equally important as well.

    I recently came across a cool Active Directory ACL Export/Dump Tool and have been using it for these audits.

    I thought you might find my experience with How to audit / find out what is being audited in Active Directory helpful so thought of sharing it with you.