[>]
Opreated by Fermi Research Alliance, LLC for the U.S. Department of Enrgy Office of Science.

Kerberos, Certificates, and Proxies

Marc W. Mengel

2015-09-18

[<] [>]

Computer Security Systems

[<] [>]

Basic Issues:

[<] [>]

Principles:

[<] [>]

Examples:

Physical
[<] [>]

Examples:

[<] [>]

Symmetric/Shared Key Encryption

[<] [>]

Kerberos

[<] [>]

Kerberos: example

[<] [>]

Kerberos: Important Details

[<] [>]

Exercise:

[<] [>]

Asymmetric/Public Key systems

[<] [>]

Sending Messages:

[<] [>]

Signing Messages:

[<] [>]

Signing Keys:


[<] [>]

RSA: Fun with Prime Numbers

RSA: Cont.

[<] [>]

Exercise:

[<] [>]

Certificates

More Fun with Signatures
[<] [>]

ISO Certificates: x509

[<] [>]

Homework/Exercise

Look at the openssl cookbook
[<] [>]

Proxies

Proxies are special certificate/key bundles, with:
[<] [>]

Proxies (cont)

Important bits about Proxies
[<] [>]

Grid vs Proxy

How to grid tools use Proxies? Thus proxies are Only Useful if they have VO attributes.
[<] [>]

Proxy Issues