Feeds

Kerberos Redux?

Definitely maybe

  • alert
  • submit to reddit

Internet Security Threat Report 2014

With the arrival of Windows Server 2003 we might be forgiven if we think that Kerberos, a "secure method for authenticating a request for a service in a computer network", is on its way out. After all, Microsoft have been seen as the principal torch bearer. What is clear in Server 2003 is that Microsoft are starting to push PKI as the way forward. Talk to Microsoft people and you might find an unusual ambivalence to Kerberos.

In addition to which, there has always been the view in parts of the industry, both vendor and user, that Kerberos does not scale and is not rich enough to support eCommerce.

It is somewhat refreshing therefore to find a new Kerberos product on the market. CyberSafe is a UK-based company that phoenixed out of the demise of the US parent.

The release of CyberSafe's TrustBroker WebAccess product underlines the belief in the Company that Kerberos still has much to offer. WebAccess provides Kerberos authentication services between workstations running a Web browser and Web servers, or Web proxy servers accessible across the network. Used in conjunction with the optional WebAccess Application Server, the authenticated identity of the user can also be securely presented to JAVA servlets running on an application server.

WebAccess uses the Kerberos protocol to authenticate users when they login to the Windows domain. The credentials obtained during this login can be used by the browser to present a security context to the Web server or Web proxy server - meaning that the user only needs to authenticate once when they login to the workstation - and effectively providing Web single sign-on.

An additional benefit is that WebAccess authentication between the browser/workstation and the Web server or Web proxy server is mutual, so that the server trusts who the user is, and the users browser is able to trust the identity of the server, without the addition of more technology.

Compare this to more commonly used Web authentication techniques. Typically, a domain cookie maintains a context for user access to a Web server, so they don't have to re-authenticate for each URL accessed in the same domain. Once the Web server determines the identity of the user at the browser, it is able to use this to determine their access rights or entitlement.

In a multi-tier application architecture, the cookie is then the reference point for further authentication requirements. CyberSafe's proposition is that their approach offers greater in-line security as the Web server to accesses other tiers across the network on behalf of the user. For example, a database requiring authentication of the user to determine access rights.

The attractiveness of WebAccess is that it offers an alternative to PKI and vendors such as RSA, Secure Computing and Arcot. If you have a large Kerberos installation already it might allow you to extend it without the interoperability challenges you might otherwise face.

CyberSafe is the only real independent player in the Kerberos space. Microsoft adopted CyberSafe's technology in Windows 2000. There remain questions over whether CyberSafe can compete, not just with alternative technologies but also with companies such as Microsoft, Sun and HP who all provide Kerberos support out-the-box and whose channel partners could build similar solutions to CyberSafe's WebAccess.

This seems a solution for die-hard Kerberos supporters. CyberSafe are looking at other market areas where they think Kerberos is uniquely suited and it might be these that secure the future of the company. © IT-Analysis.com

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.