{"id":16532,"date":"2009-12-03T18:09:09","date_gmt":"2009-12-03T22:09:09","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=16532"},"modified":"2014-06-23T12:23:28","modified_gmt":"2014-06-23T16:23:28","slug":"kerberos","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/iam\/authentication\/kerberos\/","title":{"rendered":"Kerberos Authentication"},"content":{"rendered":"<p>Kerberos is a network authentication protocol developed at MIT. It is designed to       provide strong authentication for client\/server applications by using secret-key cryptography. Kerberos is named for the three-headed watchdog from Greek mythology who guarded the entrance to the underworld.<\/p>\n<p>Kerberos offers a strong, standards-based authentication system on a wide variety of systems, ensuring the security of your personal and professional data at BU.<\/p>\n<h3>Features<\/h3>\n<ul>\n<li>Kerberos provides the tools of authentication and strong cryptography over the network.<\/li>\n<li>IS&amp;T maintains secure Kerberos servers in a number of locations to ensure the availability of campus-wide authentication services.<\/li>\n<\/ul>\n<h2>Getting Started<\/h2>\n<p>Kerberos is sensitive to time differences between server and client, so client systems should synchronize their clocks to <a href=\"https:\/\/www.bu.edu\/tech\/services\/infrastructure\/networks\/ntp\/\">network time<\/a>.<\/p>\n<p>Authentication systems and their integration into varied environments is fun (well, we think so, but hey, we&#8217;re geeks), but it can be tricky. <a href=\"\/tech\/contact\/\" class=\"myhelp_activate\">Submit a service request<\/a> for help integrating Kerberos authentication into your environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kerberos is a network authentication protocol developed at MIT. It is designed to provide strong authentication for client\/server applications by using secret-key cryptography. Kerberos is named for the three-headed watchdog from Greek mythology who guarded the entrance to the underworld. Kerberos offers a strong, standards-based authentication system on a wide variety of systems, ensuring the&#8230;<\/p>\n","protected":false},"author":2618,"featured_media":0,"parent":12585,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/16532"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/2618"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=16532"}],"version-history":[{"count":22,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/16532\/revisions"}],"predecessor-version":[{"id":82354,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/16532\/revisions\/82354"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/12585"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=16532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}