I must have watched half a dozen different videos over the last two days trying to wrap my head around Kerberos. Not a single other video mentioned the Kerberos Tray, or the CLI tool for the end user. This is BY FAR the BEST explanation I have found, bar none!! Fantastic job!!!
I had Kerberos in my university.. terrible explanations, I was completely lost. Now I went back on it and found your video. I now understand the main ideas way better. Thanks man
Man you put this in language that a moderately technical person can understand. Hours of meetings with folks trying to explain it in different ways and you nailed it in 7 minutes.
Anyone who want to explain or train or talk about IT better watch this video -- excellent explanation with a lot of 4W and 1H, and variation in the tempo.
Thank you Don and CBT Nuggets! This is definitely one of the best simple high level illustrations of kerberos! Those colored keys really did it for me!
After these two years, this video was very educative. I knew nothing about Kerberos and what the heck it was, now I know what it is and how useful it is.
Short and sweet, nice! If only every video explaining IT concept in youtube is as neat as yours, it would be nice for every people of every age to learn IT
Thank you. I am not much into kerberos & was looking for some tutorials that can help me understand the same. Came across this video which helped me understanding kerberos funda's in a very simple way. Thank you once again.
rohit uppal You are welcome! Make sure to visit our channel again if you have any future questions. We have over 500 free tutorial videos available that may just help answer your question.
This is not exactly how this happens. Like the first request is always plain text from the client to the Authentication service of the KDC and subsequent communication between client and TGS.
Just to clarify all : When a user logged on, the Kerberos client on the user's workstation accepted the password from the user and converted it into an encryption key by passing the text through a one-way hash function. The resulting hash was the user's master key. The client used this master key to decrypt session keys received from KDC. So, the user password is hashed. The hash is used as the key. Now DC will also have the same hash of the user password. The DC will lookup the user, find it's hash, use it as the key and decrypt the authenticator file. Hence, symmetric encryption is used with hash of user password as the key. - Reference: msdn.microsoft.com/en-us/library/windows/desktop/aa380510(v=vs.85).aspx
Thanks for clearing the doubts.. I was confused with the password and shared secret key.. my last doubt is the shared secret key mentioned in Kerberos is nothing but the password which is in encrypted form? Am I right? Or both are different.
Nice. When I read this in a book, it didn't make sense to me. I watch this video and it's so much clearer. Kerberos is such a cool concept actually. Thanks.
This is by far the best and easiest to understand explanation of this that I have seen. If you ever make one explaining how SPN's and Kerberos delegation work I would be very grateful.
I'm trying to implement a Windows Authentication - Kerberos - Webcenter Content solution and, for starters, this gave me a clear explanation of what Kerberos does in between. Thank you!
the instructor Don should be keith's friend and one thing in common between them is that they have the key to teach what is required and clients are happy
This video has been out for a while and I still think it does the best job of explaining kerberos authentication and what's in a ticket. I've used this to help explain the concept to my team many times. Thank you!
AWESOME VIDEO! VERY INSIGHTFUL AND EASY TO UNDERSTAND! I'm studying for CISSP. I previously had a knowledge of how it worked but not an understanding of what went on nor an in depth understanding of how the "what" went on. Your video is perfect. MAKE MORE FOR ALL DOMAINS IN CISSP! THANK YOU THANK YOU THANK YOU!
Medellin, this is Don Jones, a CBT Nuggets trainer. He has an IT expert with areas of expertise including Windows Server, PowerShell, SQL Server, and among a long list of others.
This is much much clearer explanation. Thank you. The only thing that explained properly in all the other videos I watched so far is that 'Three headed dog' crap..
the best explanation of kerberos I have ever seen! Thank you.
I concur!!!
About to comment the same
@@nonsougwu8040 hear! hear!
yes. it is. same for me.
And the simplest.
I must have watched half a dozen different videos over the last two days trying to wrap my head around Kerberos. Not a single other video mentioned the Kerberos Tray, or the CLI tool for the end user. This is BY FAR the BEST explanation I have found, bar none!! Fantastic job!!!
Thanks for the comment. We are glad we could help out.
Is there a CBT Nuggets course on Kerberos?
This is the best explanation. Do not search for any other video.
Normally the best explanations are the simpliest ones. This video proves it. Thanks.
if every concept in computing and computer networking was taught as kerberos is explained here, we would all be experts in no time
Best kerberos ticket explanation. Thanks.
A note: You don't have to download 'kerbtray'. You can just type 'klist' and view cached tickets.
Have fun.
Awesome!! I I didn't know I had so many tickets on my system.
We are glad you enjoyed this MicroNugget Joe!
I had Kerberos in my university.. terrible explanations, I was completely lost. Now I went back on it and found your video. I now understand the main ideas way better. Thanks man
Man you put this in language that a moderately technical person can understand. Hours of meetings with folks trying to explain it in different ways and you nailed it in 7 minutes.
Anyone who want to explain or train or talk about IT better watch this video -- excellent explanation with a lot of 4W and 1H, and variation in the tempo.
If you can't explain it simply, you don't understand it well enough.
And you sir definitely understand it more than enough :)
Thank you
Fantastic. Gone from complete confusion to clarity in 7mins. Thank you
Excellent. No fluff; just solid information, presented engagingly.
Much appreciated!
Thank you Don and CBT Nuggets! This is definitely one of the best simple high level illustrations of kerberos! Those colored keys really did it for me!
The way he explained is better than any other speaker i ever know...
After these two years, this video was very educative. I knew nothing about Kerberos and what the heck it was, now I know what it is and how useful it is.
You really broke down a complex topic into a clear and concise way. THANK YOU!
In the last few days , I have seen multiple videos on the Kerberos step by step process.. This was the most simple and detailed one..
Short and sweet, nice! If only every video explaining IT concept in youtube is as neat as yours, it would be nice for every people of every age to learn IT
A great guy, Mr. Rob Z, brought me here. Thank you. Great video and explanation! Thank you Don Jones.
by far the best and simplest Explanation of Kerberos i have seen.
Explaining a Complex thing in Simple terms is an ART not SCIENCE......
Thank you. I am not much into kerberos & was looking for some tutorials that can help me understand the same. Came across this video which helped me understanding kerberos funda's in a very simple way. Thank you once again.
rohit uppal You are welcome! Make sure to visit our channel again if you have any future questions. We have over 500 free tutorial videos available that may just help answer your question.
This is not exactly how this happens. Like the first request is always plain text from the client to the Authentication service of the KDC and subsequent communication between client and TGS.
We're glad we could help you understand Kerberos.
Just to clarify all :
When a user logged on, the Kerberos client on the user's workstation accepted the password from the user and converted it into an encryption key by passing the text through a one-way hash function. The resulting hash was the user's master key. The client used this master key to decrypt session keys received from KDC.
So, the user password is hashed. The hash is used as the key. Now DC will also have the same hash of the user password. The DC will lookup the user, find it's hash, use it as the key and decrypt the authenticator file. Hence, symmetric encryption is used with hash of user password as the key. - Reference: msdn.microsoft.com/en-us/library/windows/desktop/aa380510(v=vs.85).aspx
Thanks for clearing the doubts.. I was confused with the password and shared secret key.. my last doubt is the shared secret key mentioned in Kerberos is nothing but the password which is in encrypted form? Am I right? Or both are different.
I read about Kerberos many times but there were a lot of doubts. Your explanation with color lock and keys made it very simple for me. Thanks a ton!
Nice. When I read this in a book, it didn't make sense to me. I watch this video and it's so much clearer. Kerberos is such a cool concept actually. Thanks.
a very clear & short explanation, thanks!
Fantastic explanation of Kerberos. Wish Don Jones was still doing IT training.
WOW! I have spent hours trying to figure out how kerberos works and boom... 7 minutes later it all makes sense. Thank you so much!
The BEST explanation by far... Love the colours used, makes it easier to understand!! Please upload more using this fantastic training method.
This is by far the best and easiest to understand explanation of this that I have seen. If you ever make one explaining how SPN's and Kerberos delegation work I would be very grateful.
I'm trying to implement a Windows Authentication - Kerberos - Webcenter Content solution and, for starters, this gave me a clear explanation of what Kerberos does in between. Thank you!
the instructor Don should be keith's friend and one thing in common between them is that they have the key to teach what is required and clients are happy
You have made an extremely complex subject easy ..whenever i attend an interview i watch it :)
This video has 358,000 views and only 7,000 likes. People really do suck and are not appreciative. Thank you for this CBT, great explainer.
I have seen lots of videos of kerberus, but this, as a matter of fact, help me to understand. great explanation.
Thank you Don for not being a slobbering squeakbox.
that was amazing video .... ohhh my god! you don't know how much time I spent to learn the concept of Kerebros thanks
derka derka derka
There are several tutorials about Kerberos out there that make it seem extremely complicated; this has been done really well thank you!!
Simple, Awesome and Clear depiction. Makes it easy for anyone to understand.
Excellent. Clearly spoken and presented in a visually descriptive way.
At last, a good video about Kerberos basics. Thanks.
This video has been out for a while and I still think it does the best job of explaining kerberos authentication and what's in a ticket. I've used this to help explain the concept to my team many times. Thank you!
To the point, clear explanation. Best so far i have seen
Even years after this video was created, this helped explain how it works.
no one could ever make this easier than you sir.
Best video on Kerberos on TH-cam !
This is so much better than most of the other Kerberos clips out there. Thank you!
Thanks Yasir for the feedback!
Best explanation of Kerberos yet!
You guys at CBT Nuggets are GODS!!!
Amazing, you explained an extremely complicated subject with brilliant clarity. Much, much appreciated.
This is definitely the best explanation of Kerberos I have ever seen. Great job and Thank you.
wow so clear and concise. Dont know why others cant explain it like this.
It was the colored keys on the KDC that led to to eureka moment. Great stuff.
This is the easiest presentation of the lot. Thanks a bunch!
Thank you sir for explaining it in the simplest way possible.
AWESOME VIDEO! VERY INSIGHTFUL AND EASY TO UNDERSTAND! I'm studying for CISSP. I previously had a knowledge of how it worked but not an understanding of what went on nor an in depth understanding of how the "what" went on. Your video is perfect. MAKE MORE FOR ALL DOMAINS IN CISSP! THANK YOU THANK YOU THANK YOU!
Don Jones, Sir, you are awesome! Really cool way to explain the concept. Very easy to understand. :)
Thanks for this. I'm embarrassed at how simple kerberos could have been for me had I just watched this video years ago.
You can tell a smart person by how he makes complex things so easy to understand. 🧚♀️💖
Extremely informative, simple, lucid explanation. Many Thanks for this.
This is the best explanation I have come across. Excellent and well done
Glad it was helpful, Samuel! Thanks for watching and sharing the feedback!
the best way to explain how kerbero works. thank you so much.
Medellin, this is Don Jones, a CBT Nuggets trainer. He has an IT expert with areas of expertise including Windows Server, PowerShell, SQL Server, and among a long list of others.
Very informative and the best explanation on kerberos I have seen. Thank you very much!
Wow! So complicated topic explained so well, easy to understand.Thank You
I watched 5 or 6 vidoes and this by far is the best explanation....great job!!
Glad we could help out!
Thanx Don for all these explanation. I really love your MicroNuggets.
Straightforward concept explanation without having to delve on the technical portion. Great job!
The best explanation I found over the net. Thanks
thank you for explaining the concept in such a simple matter. Your animation works too.
Thanks a lot! I am starting into AD and needed to better understand how Kerberos worked. This video was of tremendous help!
As a visual learner, this helped me so much. Thanks!
Glad it helped!
The best explanation I've ever seen! Thank you!
Superb explanation. Well articulated and nicely demonstrated using the flow diagram
Thanks its a good explanation. I finally understand about kerberos after 1 year
This was spot on. Thanks for helping me to understand how Kerberos works :)
That was better than other videos with higher production. Don't change that.
you just saved my school presentation ! Thank you very much for the explanation !!!
Thanks a lot for being so clear and pedagogic! It's the first time I heard about Kerberos and now I have a clear picture of what it looks like.
Excellent. Very simple explanation of a relatively complex topic.
Thank you for taking the time and effort to present this simple tutorial for everyone to understand how it works.
this explanation about kerberos is perfect finally I could understand what's it and how it works. Thanks.
What a beautiful explanation of kerberos
This cleared up what was otherwise a murky topic for me. Thank you!
Thank you. This is the best video explaining on how Kerberos Work?
The best inllustration so far
This is much much clearer explanation. Thank you.
The only thing that explained properly in all the other videos I watched so far is that 'Three headed dog' crap..
Thank you for taking the time to create such an awesome video. I finally understand Kerberos after all these years :P better late than never.
This is a old but really really really good explanation.
Oh my god you blew my mind, that was the easiest explanation I've seen yet.
Wonderful training video. Thanks for taking time to make it!
Of course! Thanks for the kind words.
讲的真好,清晰明了。
Crystal clear, Mr instructor.
Thank you. Simplified and easy to understand.
You covered this topic in a very easy way, thanks
clear + clear accent. Thanks, buddy
one of the best about Kerberos.