Solved

what is "Kerberos Security" in Solaris 10 and when is it used?

Posted on 2006-06-19
2
617 Views
Last Modified: 2013-12-21
I am installing Solaris 10 for the first time and have no experience installing unix OSs. Only thing I am good at is following directions. I intend to install and reinstall until I am confident enough with its configuration that I can colocate the box. Thus, security is a major concern for me, including concerns regarding someone having physical access of the drives should the box ever get stolen (thus, encryption of the data drives is of great interest to me).

The box is a Sun E250 dual processor, 512 mb RAM, 6 18 gb hard drives, 2 power supplies.

While installing Solaris 10, I am prompted with the following:


Specify Yes if the system will use the Kerberos security mechanism.

        Specify No if this system will use standard UNIX security.
      
            Configure Kerberos Security
            [ ] Yes
            [X] No

What exactly is "Kerberos Security", what advantages are there to using it and not using it, and would it benefit a system that will eventually be colocated?
0
Comment
Question by:TJonLongIsland
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
Nukfror earned 500 total points
ID: 16939017
For one definition look here:

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212437,00.html

Amont the pros of using Kerberos is better security in locking down your servers and services that user Kerberos.  One cons is Kerberos requires a highly-secure server that provides the tickets authorization and verification services (among other Kerberos tasks).  So to really get Kerberos working, you need to do LOTS of planning to make it work correctly.

If you're going to colo a server, I would suggest enabling IPFilter on Solaris 10 and using SSH.  If you want to get even more secure, then read about and utilize RBAC.


0
 

Author Comment

by:TJonLongIsland
ID: 16979492
I like your answer, and am about to close this question. I have a follow-up though, that I'll ask as a separate question.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
Suggested Courses

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question