Kerberos - authentication protocol

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 ก.ย. 2024
  • Please support my channel by becoming a Sunny Classroom member. Your support is much appreciated. / sunnyclassroom
    At 4:30: A mistake: step 3: When the file server gets the token, it "decrypts" (not "encrypts") the token with the secret key shared with TGS.
    In Greek mythology, Kerberos is a dog with three heads. But today I will not talk about the dog. Kerberos is an authentication protocol for client/server applications. I will demonstrate with an example how Kerberos works. Keep in mind, Kerberos implements private key encryption.
    Playlist: Basic Cryptography
    • Private Key Encryption...
    Advanced Cryptography:
    • What is digital signat...
    Please leave comments, questions and
    Please subscribe to my channel
    Many thanks,
    Sunny Classroom

ความคิดเห็น • 708

  • @beeflat2896
    @beeflat2896 4 ปีที่แล้ว +34

    I'm so happy I decided to study IT at a time when Sunny's videos exist.

  • @humbertomacias6486
    @humbertomacias6486 4 ปีที่แล้ว +21

    Great explanation. Minor mistake was duly noted about decryption step between client and fileserver when decrypting the encrypted token granted by the Ticket Granting Server. Thanks!

    • @Vincerama
      @Vincerama 2 หลายเดือนก่อน +1

      Thanks! I was thinking the same thing, but wasn't sure. He says at 4:24 "When the file server gets the token, it ENCRYPTS the token", I think he means that it DECRYPTS the token. I had to play that back to make sure I heard what I heard, but if you noticed it too, then I think my gut was right and it's just a mistake in the video.

  • @doomedpepper8109
    @doomedpepper8109 4 ปีที่แล้ว +17

    Great video! However, there were 2 mistakes:
    1) At 2:26, the request is encrypted with a HASH of the clients password, not the clients actual password (because that would mean that the Authentication Server is storing the clients password in plaintext, which is NOT GOOD - it instead stores a hash of the clients password)
    2) At 4:32, it should be "decrypts the token" instead of "encrypts the token", because it's already been encrypted.
    Other than that, great explanation. Very easy to understand!

    • @ian230187
      @ian230187 3 ปีที่แล้ว +2

      True...even i was a bit skeptical about the point 1....

    • @sulekha3771
      @sulekha3771 3 ปีที่แล้ว

      sorry i am just trying to understand a bit better. can you explain how the request is encrypted with a hash of the client's password??

    • @sb_4
      @sb_4 2 ปีที่แล้ว

      I think you're right in your first point about this being wrong, but I don't think you're correct either. The initial request to the AS is completely plaintext. Please do correct me if you think I'm wrong.
      I agree that the _response_ (including the TGS session key etc) from the AS would be encrypted using the hash of the client's password.

    • @doomedpepper8109
      @doomedpepper8109 2 ปีที่แล้ว +1

      @@sb_4 the initial request is the client providing their credentials so that they can be authenticated. Why would that be in plaintext lol. Anyone would be able to sniff the traffic and obtain their credentials that way

    • @sb_4
      @sb_4 2 ปีที่แล้ว

      @@doomedpepper8109 Because they just send their username, not their password (nor hashed password). There is no need to authenticate, aside from the Authentication Server checking that the user exists, because of the fact that the user can only decrypt the first response from the AS if they know their password / hashed password.

  • @utkarshagrawal6060
    @utkarshagrawal6060 5 ปีที่แล้ว +12

    WOW! after spending two hours of searching finally I got this. A very very clear video. Thanks for your efforts.

  • @tanhazjustdance2024fan4ever
    @tanhazjustdance2024fan4ever 4 ปีที่แล้ว +338

    This the best explanation about Kerberos I saw on youtube. This is coming from a senior systems engineer. Keep up the good work.

  • @An8FoldFunky
    @An8FoldFunky 5 ปีที่แล้ว +59

    That was truly brilliant, thanks for making this so easy to understand.

    • @sunnyclassroom24
      @sunnyclassroom24  5 ปีที่แล้ว +2

      you are welcome. Thank you for leaving nice comment.

  • @nekilof-2363
    @nekilof-2363 3 ปีที่แล้ว +2

    I really liked the visuals you provided. It really helped me understand the "three heads of Kerberos" (the three keys).

  • @2dapoint424
    @2dapoint424 3 ปีที่แล้ว +6

    Cannot be explained more simpler than this!! Very good work!! Thanks for uploading..

  • @aznibas
    @aznibas 4 ปีที่แล้ว +2

    I learnt so much from your VDOs that I can not explain. I wish I could learn more that I need to learn from you. Thank you.

  • @dgarcia1688
    @dgarcia1688 4 ปีที่แล้ว +3

    Kerberos has been very difficult for me to comprehend, this helped so much. Thank you Sunny.

  • @rampandi9302
    @rampandi9302 5 ปีที่แล้ว +1

    Whenever I was not clear with any topic I will search for sunny videos in TH-cam..

    • @sunnyclassroom24
      @sunnyclassroom24  5 ปีที่แล้ว

      Thank you very much. it means a lot to me.

  • @coryhebert3413
    @coryhebert3413 4 ปีที่แล้ว +8

    Unbelievably good explanation. The best I've come across. Keep up the great work!

  • @Coordman
    @Coordman ปีที่แล้ว

    Sunny, I am studying for my SY0-601. Kerberos had me completely baffled until I watched your video. Thank you SO MUCH!!

  • @morganwoodstech9654
    @morganwoodstech9654 ปีที่แล้ว

    This just made more than a few Active Directory concepts I've been learning about in my cybersecurity studies click. Wonderfully simple and straightforward explanation!

  • @voldimmoral
    @voldimmoral ปีที่แล้ว

    This is the most useful breakdown of Kerberos I've found anywhere on the Internet. This is gold, thank you!
    I also wanted to compliment your English language. You took your time and did fantastic pronouncing words. Awesome job!

  • @James-km3xq
    @James-km3xq 3 ปีที่แล้ว +3

    Thank Sunny, I started watching your clips daily, they are so helpful and easy to understand as stated by everyone!

  • @proptbro
    @proptbro 6 ปีที่แล้ว +163

    Wow great explanation best explanation on TH-cam

    • @sunnyclassroom24
      @sunnyclassroom24  5 ปีที่แล้ว +6

      Many thanks.

    • @tarnveersingh2552
      @tarnveersingh2552 5 ปีที่แล้ว

      No only on SONNY's Channel

    • @raptorcybersecurity
      @raptorcybersecurity 4 ปีที่แล้ว +1

      I'm in a graduate course in networking and the explanation there was in the form of voluminous text explanation and a crappy graphic from Wikipedia (lame). This is a beautifully clear explanation that leaves no doubts in my mind about the process, or the objects/subjects involved - Thanks!

    • @emp7y
      @emp7y 4 ปีที่แล้ว +1

      I paid for many udemy courses and books but this channel is the best. I wish he had some courses in udemy. This channel has very clean and on point explanation within mins. Other courses takes 20mins and you get even more confused..... Please create udemy courses!

  • @Xx-nd1rs
    @Xx-nd1rs 2 ปีที่แล้ว

    I watched some videos on this topic but i was still confused but your explanation was very clear and easy to understand.. I’m so grateful thank you

  • @chiragbhayana2312
    @chiragbhayana2312 ปีที่แล้ว

    Your explanation is genuinely very grasping and absorbing. Continue making more such videos

  • @programmingpurpose1329
    @programmingpurpose1329 3 ปีที่แล้ว

    Precise and best explanation before watching this video it is y difficult for me to understand this topic but now it's crystal clear.

  • @planetside11
    @planetside11 2 ปีที่แล้ว

    That's the clearest explanation of Kerberos that I've ever heard. Thank you, Sunny.

  • @KDOERAK
    @KDOERAK ปีที่แล้ว

    A great intro to Kerberos: short, simple and to the point - thx!

  • @TheMbudzeni
    @TheMbudzeni 4 ปีที่แล้ว +1

    When I heard him talk I almost stopped the video but I am glad I didn't because he explains Keberos authentication very well

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว

      Thank you for watching! I appreciate it!

  • @_dx_
    @_dx_ 2 ปีที่แล้ว

    Dawg. You explained that so well in such simple terms. Thank you brother!

  • @maharajpatil8571
    @maharajpatil8571 3 ปีที่แล้ว +1

    I just love the way you say "This is Sunny" haha!! Yeah!! Your explanation is too brilliant. Keep going!!!

  • @atuhaireandrew3201
    @atuhaireandrew3201 2 ปีที่แล้ว

    This is truly the best explanation on Kerberos that I have seen. Very easy to understand. Thank you!

  • @Pikwhip
    @Pikwhip ปีที่แล้ว

    As a total newbie this helped me a lot. Thank you!

  • @salkeldeliaoe
    @salkeldeliaoe 4 หลายเดือนก่อน

    Thank you so much with the clear and consise explaination especially with the shared secret keys which i was confused about. Thank you once again sonny;

  • @emp7y
    @emp7y 4 ปีที่แล้ว +4

    I just love your videos, you help me pass my A+ with you perfect explanation and graphics. I feel bad for not paying for your work. Please create some form of a Chanel or upload all these videos on Udemy. You will be a great help to so many students!!!

  • @omidsupply9550
    @omidsupply9550 ปีที่แล้ว

    No better way to explain other than in very simple and straightforward & elaborative way..

  • @vishalt4682
    @vishalt4682 5 ปีที่แล้ว +2

    Thats a very nice & precise high level explanation for Kerberos. Thank you .

  • @lenso2010
    @lenso2010 3 ปีที่แล้ว

    Sunny always the best. Every topic you cover, you give best shots. Thank you

  • @victorjozwicki8179
    @victorjozwicki8179 4 ปีที่แล้ว +1

    There is also TGS SESSION KEY included at the first encounter as well as a HTTP SERVICE SESSION KEY at the second one, to ensure even more security

    • @masoudshahsavari2815
      @masoudshahsavari2815 4 ปีที่แล้ว +1

      Victor Jozwicki I totally agree I think he said it wrong here, server should have decrypt it and encrypt it.

  • @cds327131
    @cds327131 3 ปีที่แล้ว

    the best explanation, clear and straight to the point

  • @themiseducationoftheameric7407
    @themiseducationoftheameric7407 ปีที่แล้ว

    Superb Explanation Sunny! All the rest I've seen was just confusing.

  • @nicholasbarning8250
    @nicholasbarning8250 5 ปีที่แล้ว +2

    Another great video Sonny, Thanks!

  • @tahir8ify
    @tahir8ify 4 ปีที่แล้ว +1

    This is excellent explanation, thanks you so much for such a simple explanations. I was so confused before watching your video but now it is clear.

  • @LockwoodStars
    @LockwoodStars 6 ปีที่แล้ว +2

    WoW .. Network subject is abstract for me, but your videos makes sense out of it. Thank You for your videos.
    Quite informational. Wish I would have seen these videos during my collage days (long back)..

    • @sunnyclassroom24
      @sunnyclassroom24  6 ปีที่แล้ว

      Many thanks for your nice comments. I hope my videos are helpful to those who just start studying networking and cyber security.

  • @jerryjohn2655
    @jerryjohn2655 5 ปีที่แล้ว +2

    Sir you explain so well in detail i like your teaching style thank you so much

  • @Jay-sp9wg
    @Jay-sp9wg 2 ปีที่แล้ว

    Thank you Sunny for this wonderful explaination🤗

  • @ramnalkande7138
    @ramnalkande7138 5 ปีที่แล้ว +4

    Thank you so much sunny sir to provide this video......with the help of this video I can write on examination paper very well.......so thank you so much

  • @amoghkulkarni4512
    @amoghkulkarni4512 7 ปีที่แล้ว +130

    Set the video speed to 1.25 and thank me later :) Nice explanation. Thanks a lot

    • @sarathbab
      @sarathbab 6 ปีที่แล้ว +8

      Don't put unwanted comments, like speed. Slow learning is good for rememberence

    • @amoghkulkarni4512
      @amoghkulkarni4512 6 ปีที่แล้ว

      sarathbab yes.. Sure you can use the slow learning approach.

    • @dariustwin3393
      @dariustwin3393 6 ปีที่แล้ว +9

      I set it to 2x and it worked for me.

    • @adityamittal4357
      @adityamittal4357 6 ปีที่แล้ว +10

      I remember better when I learn fast. If I learn slowly I get bored and lose track and forget everything. I watched lectures at 1x and 2x and then tried to write down what I remembered and had a much better recall when I watched at 2x.

    • @tomasandersen35
      @tomasandersen35 5 ปีที่แล้ว +1

      @@adityamittal4357 probably because you already had watched it in 1x speed ;) lol

  • @akadubs8537
    @akadubs8537 2 ปีที่แล้ว

    Your examples and explanations are fantastic.

  • @silvertad3833
    @silvertad3833 2 ปีที่แล้ว

    Oh No, I'm here to hear you talk about the dog!

  • @danasudheer
    @danasudheer 6 ปีที่แล้ว +25

    Hi sir first of all thank u for your video..I have one question is that the Token from TGS is encrypted with the new secret key ,then once files server receives the Token that will be "encrypted or de-crypted" from the file server with the shared key which has been sent by TGS? 4:29...

    • @sunnyclassroom24
      @sunnyclassroom24  6 ปีที่แล้ว +27

      De-crypted it is. It was my mistake.

    • @bkbk4726
      @bkbk4726 4 ปีที่แล้ว +1

      good catch

    • @tamilstudent1
      @tamilstudent1 4 ปีที่แล้ว

      Even i was confused for a while! Thanks.

  • @moisesvelez1147
    @moisesvelez1147 4 ปีที่แล้ว +1

    Not gonna lie, I usually avoid all video explanations with a presenter that has a strong accent, it really throws me off. I know it's really just my problem because everyone else doesn't seem to have an issue with it except me. The hardest for me are the ones with Indian accents, just can't do it. Anyways, for the longest time I would see the Sunny classroom videos and just ignore them, but the comments were always so positive I decided to give him a try and boy am I glad that I did. Even with the accent, you have such a great way of explaining things, you really make complex subjects easy to understand which is what a good teacher does. Thank you for making the videos!

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว +1

      Thank you very much, Moises, for your nice and encouraging words. I will do my best! I wish I could speak English better. Many thanks!

    • @aznibas
      @aznibas 4 ปีที่แล้ว +1

      Moises, I have a remediation for you. You need to either go to India and learn English in their accents. Secondly try the same to practice with Indian people without going there. I have seen many of my American friends they understand Chinese or Indian accents 100%. It needs some patience, which we had to learn English.

  • @GoogleUser-iv9nm
    @GoogleUser-iv9nm 2 ปีที่แล้ว

    Спасибо, Санни! Очень наглядно, просто и без лишней информации.

  • @JahAhKay
    @JahAhKay 4 ปีที่แล้ว +3

    THE WAY YOU BREAKS THINGS DOWN MAKES ME BELIEVE YOU ARE THE GREATEST HUMAN BEING LIVING ON EARTH TO THIS DAY.
    THANK YOU SIR

  • @josuesainz227
    @josuesainz227 3 ปีที่แล้ว

    This is really great you just simplified a complex topic for me

  • @idontneedthis56
    @idontneedthis56 4 ปีที่แล้ว +1

    Great explanation @Sunny. I was wondering if you would do a quick video on keytabs and principals and why and how are they used. Where are they generated, where are they stored, how they help in automation etc.

  • @sththapa416
    @sththapa416 5 ปีที่แล้ว +1

    Best teacher.. Respect from nepal 🇳🇵🇳🇵

  • @theaffiliate38
    @theaffiliate38 2 ปีที่แล้ว

    Great video explanation! It really make you remember and understand the concept of Kerberos! Thanks a lot!

  • @Major7Sharp5
    @Major7Sharp5 4 ปีที่แล้ว +1

    Very nice explanation. Thank you!

  • @malikadabare3719
    @malikadabare3719 5 ปีที่แล้ว +1

    Nicely done sir. Wish if you were our lecturer

  • @kmdkhaleeluddin6257
    @kmdkhaleeluddin6257 ปีที่แล้ว

    The way of explanation is very good and explanation with practical is so awesome ❣️😇 so i wanna request you to make these notes and upload any your particular website so student able to download your notes and it's could be save time for us 😇❣️🥺thank you so much sir keep it up 🥺❣️

  • @Akpearl
    @Akpearl 6 ปีที่แล้ว +1

    Very Good Explanation about Kerberos, Thank you Sunny.

    • @sunnyclassroom24
      @sunnyclassroom24  6 ปีที่แล้ว

      Many thanks for your encouragement. I will do my best. I hope my videos are helpful.

  • @karisrishouri9932
    @karisrishouri9932 3 ปีที่แล้ว

    Extraordinary explanation ever!!!!👌👌👌

  • @yashwantdhole7645
    @yashwantdhole7645 5 ปีที่แล้ว +1

    I love you man. I never saw such a great explaination.

  • @dibyendughosh3589
    @dibyendughosh3589 4 ปีที่แล้ว

    Just amazing explanation... this is indeed the best video on the topic.. please continue the good work

  • @leoharrison9852
    @leoharrison9852 3 ปีที่แล้ว

    Very simple but clear explanation, thank you!

  • @xavierpierre5586
    @xavierpierre5586 2 ปีที่แล้ว

    perfect animation make the process really easy to understand

  • @tedshhhh
    @tedshhhh 5 ปีที่แล้ว

    Very good and Simple explanation. Thank you.

  • @abdelrahmanm.6215
    @abdelrahmanm.6215 3 ปีที่แล้ว +1

    love your vids, you always have the best explanations. Thank you :)

  • @mikeyisundead
    @mikeyisundead 4 ปีที่แล้ว +1

    I finally understand the concept completely!

  • @marioandresheviacavieres1923
    @marioandresheviacavieres1923 9 หลายเดือนก่อน

    Thank you very much professor Sunny.

  • @mydeenali
    @mydeenali 6 ปีที่แล้ว

    Super sunny Great Simple ,effective and throwing detail in short video keep it up

  • @felixwinterbottom3434
    @felixwinterbottom3434 ปีที่แล้ว

    This was super easy to follow and understand, thank you very much!

  • @hanygarass225
    @hanygarass225 ปีที่แล้ว

    Best explanation ever. Thank you so much!

  • @ThaboRamoshai
    @ThaboRamoshai 4 ปีที่แล้ว

    Best explanation ever about Kerberos..wow! Thanks a lot.

  • @mrlildylchillin
    @mrlildylchillin 3 ปีที่แล้ว

    Im pretty sure there is a small error here. In step 3 the client will decrypt the token, not encrypt since its already encrypted by the TGS according to the video. Thanks again though sunny good video

  • @emdadulsadik861
    @emdadulsadik861 5 ปีที่แล้ว +28

    @Sunny Classroom, there is a mistake in Step 3. You said the file server "encrypts" with the shared key from TGS wheareas you should have said "decrypts", or what?

    • @terrywu5590
      @terrywu5590 4 ปีที่แล้ว +6

      I think it should be "decrypts".

    • @robinhood3841
      @robinhood3841 4 ปีที่แล้ว

      I was thinking the same

  • @aliceh9998
    @aliceh9998 2 ปีที่แล้ว

    Thank you so much for the great explanation!

  • @astletonymeshac18
    @astletonymeshac18 ปีที่แล้ว

    Literally the best explanation!!

  • @flowthinks
    @flowthinks 3 ปีที่แล้ว +1

    Nice. Thank you! If you can't explain it in layman terms then you don't understand it enough👌👌👌

  • @itjp
    @itjp 2 ปีที่แล้ว

    Thank you professor, Sunny. You are the best.

  • @cuddy90210
    @cuddy90210 4 ปีที่แล้ว

    Thank you so much!.. I always enjoy your videos and beautiful explanations!

  • @Alaska769
    @Alaska769 2 ปีที่แล้ว +1

    Wow superb simple way explanation tq u so much

  • @AmanSingh-xc6xv
    @AmanSingh-xc6xv 6 ปีที่แล้ว

    So simple and easy to understand. Thanks for the upload

  • @amraboeleneen2221
    @amraboeleneen2221 4 ปีที่แล้ว +2

    the legendary sunny!!

  • @Air-wt3gf
    @Air-wt3gf ปีที่แล้ว

    I like this short explanantion for a start👍.

  • @malalal1637
    @malalal1637 3 ปีที่แล้ว

    Very good and simple explanation

  • @simonnjugunamutua7923
    @simonnjugunamutua7923 4 ปีที่แล้ว +1

    Thanks for the great explanation

  • @krishnakumar.r6551
    @krishnakumar.r6551 2 ปีที่แล้ว

    Thanks for the clear explanation sir.

  • @chandansharma8658
    @chandansharma8658 5 ปีที่แล้ว

    It was really a great explanatory video on Kerberos.

  • @leizhang799
    @leizhang799 4 ปีที่แล้ว +1

    best video for Kerberos . Thanks

  • @MsRpandey
    @MsRpandey 6 ปีที่แล้ว +1

    thank you so much you explanation is very easy to understand its very helpful

  • @yawarkhan3915
    @yawarkhan3915 2 ปีที่แล้ว

    Great Explanation. Thanks for sharing the video. it's really very helpful :)

  • @hl5768
    @hl5768 4 ปีที่แล้ว

    very clear explanation, thank u for sharing

  • @Adellyn14
    @Adellyn14 5 ปีที่แล้ว +1

    Truly a great explanation! Thanks a lot

    • @sunnyclassroom24
      @sunnyclassroom24  5 ปีที่แล้ว

      You are welcome, uncle Sam!

    • @vicky02078671
      @vicky02078671 4 ปีที่แล้ว

      It's awesome sir great job truly I say ur explanation is very easy to understand. Thnx

  • @kirstenmeates8248
    @kirstenmeates8248 6 ปีที่แล้ว +3

    Very clear explanation thank you

  • @AkebonoRadio
    @AkebonoRadio 3 ปีที่แล้ว +1

    Awesome video, thank you so much!

  • @bkbk4726
    @bkbk4726 4 ปีที่แล้ว +1

    Sunny thanks for the video. Now understand the internals of KDC. Can you explain the below
    1. Who is the client here? When I try to access a website, can I be the client? If so how the AS gets my password in the first place?
    2. Also public key encryption not used in the whole explanation. I do see a private key within KDC shared between AS & TGS which I understand, since there is only AS and one TGS in this diagram it is easy to share between them. However I do see a private key shared between TGS and the File Sever which is an outside entity and can be many? How does the TGS & the File Server in the first place get to know the shared secret key? Also this leads to the question if the TGS is serving, let us assume 10000 File servers, then it should have 10000 secret keys in its possession - is my assumption correct?
    3. The main use of public key encryption is to reduce the explosion of the number of private keys. But I am not seeing any public key encryption here? - Can you please explain where public key encryption come into picture in the usage of Kerberos?
    Please let me know.

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว +1

      great questions.
      1) Kerberos is the internal system provided for internal users. Like you try to login to your company's or college's server. It is not a public website. Thus, you, as a client, have login information in the KCD system.

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว

      2) the Kerberos system uses private keys (3 pairs) to make sure you are a legitimate user. Here we do not focus on public-key encryption for your request. Thus this system would work with other encryption algorithms. However, when you make a request, private keys are used only. How do they know each other's private keys? Good question. We configure these private keys when we set up the Kerberos. Thus, they already know each other private keys.

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว

      3) When the public key is used in this scenario? Before the file server(s) send your file, you and the file server would exchange keys (handshake), then your conversations would be encrypted. by the way, if you have 1000 file servers, you probably need a device called "load balancer" which would act like a proxy, so that you do not have use 1000 private keys. I hope I answer all your questions.
      Many thanks for your great questions.

    • @bkbk4726
      @bkbk4726 4 ปีที่แล้ว +1

      @@sunnyclassroom24 Sunny yes, you answered my question. The moment you said Kerberos is for internal authentication, I got a clear picture of the whole security architecture of your example. Also now you have made me to think the need to use public key in this kind of internal situation, I will ready about load balancer, and hope will understand that. By the way do you have tutor for load balancer?

    • @sunnyclassroom24
      @sunnyclassroom24  4 ปีที่แล้ว

      @@bkbk4726 not yet. I am glad I answered your questions.

  • @SameerSrinivas
    @SameerSrinivas 5 ปีที่แล้ว

    Very informative. Thanks for your efforts. It would be very helpful if you could take an example and explain it in detail. That way, things would be crystal clear :)

  • @mitchellheick4830
    @mitchellheick4830 5 ปีที่แล้ว +1

    Good explanation, and the visual helped.

  • @yuvalpruss492
    @yuvalpruss492 5 ปีที่แล้ว +1

    Great lecture! Thanks

  • @dvadithala
    @dvadithala 6 ปีที่แล้ว +4

    You're the best Sunny! Your students are lucky to have you. Please let me know if you ever come to London. Lunch on me :)

    • @sunnyclassroom24
      @sunnyclassroom24  6 ปีที่แล้ว +1

      Thanks a lot. I will call you when I go to London :)

  • @shaikh2367
    @shaikh2367 4 ปีที่แล้ว

    This was an awesome Explanation

  • @emranxaman
    @emranxaman 5 ปีที่แล้ว +1

    I guess one mistake there at step 3. The file server actually DECRYPTS the token with shared key between TGS and itself, in order to allow the access to the user. The video actually incorrectly says 'encrypt'

    • @sunnyclassroom24
      @sunnyclassroom24  5 ปีที่แล้ว

      you are correct. I made corrections below the video. Thank you very much for pointing it out.

  • @amitpadgaonkar8830
    @amitpadgaonkar8830 10 หลายเดือนก่อน

    I didn't understand the last part where file server receives the token from the client. I understand that this token is encrypted with secret key between file server and TGS. However, there should be a validation process where file server asks TGS whether the token is valid and description of details such as client name and validity of token.
    I don't see that step here. Is it omitted or have I mistaken somewhere?

  • @aksh7437
    @aksh7437 4 ปีที่แล้ว +1

    Great explanation