Network authentication service uses the Kerberos protocol in conjunction with Generic Security Services (GSS) APIs for authentication to provide authentication and security services.
The following sections provide a general description of these protocols and how they are used on the iSeries™. For more complete information about these standards, links have been provided to the associated Request for Comments standards and other external sources.
The Kerberos protocol provides third party authentication where a user proves his or her identity to a centralized server, called a Kerberos server or key distribution center (KDC), which issues tickets to the user. The user can then use these tickets to prove his or her identity on the network. The ticket eliminates the need for multiple signons to different systems. The Network Authentication Service Application Programmable Interfaces (APIs) that the iSeries supports originated from Massachusetts Institute of Technology and have become the de facto standard for using the Kerberos protocol.
Security environment assumptions
The Kerberos protocol assumes that all data exchanges occur in an environment where packets can be inserted, changed, or intercepted at will. Use Kerberos as one layer of an overall security plan. Although the Kerberos protocol allows you to authenticate users and applications across your network, you should be aware of some limitations when you define your network security objectives:
Kerberos sources
To view the RFC listed above, visit the RFC index search engine located on the RFC editor web site. Search for the RFC number you want to view. The search engine results display the corresponding RFC title, author, date, and status.
Generic Security Service Application Programmable Interfaces (GSS APIs) provide security services generically and are supported by a range of security technologies, like the Kerberos protocol. This allows GSS applications to be ported to different environments. Because of this reason, it is recommended that you use these APIs instead of Kerberos APIs. You can write applications that use GSS APIs to communicate with other applications and clients in the same network. Each of the communicating applications plays a role in this exchange. Using GSS APIs, applications can perform the following operations:
To view the RFCs listed above, visit the RFC index search engine located on the RFC editor web site. Search for the RFC number you want to view. The search engine results display the corresponding RFC title, author, date, and status.