-
At the heart of the Kerberos protocol
24/09/2023 (updated on 05/09/2024) · 12 min read · cybersecurity cryptography authentication krb kerberos ticket ·In this article, I take you to the heart of a network protocol that has been widely used for years and yet is not very well understood: Kerberos. Indeed, during professional discussions, I often realize that although Kerberos is …
Read More -
In this article, I introduce a network authentication protocol, namely Tunnel Extensible Authentication Protocol (TEAP), a method that allows multiple authentication mechanisms within a secure tunnel. The principle is to be able …
Read More