Network authentication service uses the Kerberos protocol in conjunction with Generic Security Services (GSS) APIs for authentication to provide authentication and security services.
This topic provides a general description of the network authentication service protocols and how they are used in the System i™ environment. For more complete information about these standards, links have been provided to the associated Request for Comments standards and other external sources.
The Kerberos protocol provides third-party authentication where users prove their identities to a centralized server, called a Kerberos server or key distribution center (KDC), which issues tickets to the users. The users can then use these tickets to prove their identities on the network. The ticket eliminates the need for multiple sign-ons to different systems. The Network Authentication Service APIs that the System i environment supports originated from Massachusetts Institute of Technology and have become the de facto standard for using the Kerberos protocol.
Security environment assumptions
The Kerberos protocol assumes that all data exchanges occur in an environment where packets can be inserted, changed, or intercepted at will. Use Kerberos as one layer of an overall security plan. Although the Kerberos protocol allows you to authenticate users and applications across your network, you should be aware of some limitations when you define your network security objectives:
Kerberos sources
Requests for Comments (RFCs) are written definitions of protocol standards and proposed standards used for the Internet. The following RFCs might be helpful for understanding the Kerberos protocol:
To view the RFC listed, visit the RFC index search engine located on the RFC editor Web site. Search for the RFC number you want to view. The search engine results display the corresponding RFC title, author, date, and status.
Generic Security Service Application Programming Interfaces (GSS APIs) provide security services generically and are supported by a range of security technologies, like the Kerberos protocol. This allows GSS applications to be ported to different environments. Because of this reason, it is recommended that you use these APIs instead of Kerberos APIs. You can write applications that use GSS APIs to communicate with other applications and clients in the same network. Each of the communicating applications plays a role in this exchange. Using GSS APIs, applications can perform the following operations:
Requests for Comments (RFCs) are written definitions of protocol standards and proposed standards used for the Internet. The following RFCs might be helpful for understanding the GSS APIs:
To view the RFCs listed, visit the RFC index search engine located on the RFC editor Web site. Search for the RFC number you want to view. The search engine results display the corresponding RFC title, author, date, and status.