Statements (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:developedBy |
gptkb:MIT
|
gptkbp:firstIntroduced |
1983
|
gptkbp:hasAuthorityOver |
true
|
https://www.w3.org/2000/01/rdf-schema#label |
Kerberos protocol
|
gptkbp:includes |
gptkb:Ticket_Granting_Service_(TGS)
gptkb:Authentication_Service_(AS) |
gptkbp:is_part_of |
identity management systems
secure application design enterprise security solutions secure network architecture secure software development lifecycle authentication frameworks |
gptkbp:isAttendedBy |
IETF
|
gptkbp:isBasedOn |
tickets and symmetric keys
|
gptkbp:isCitedIn |
RFC 4120
RFC 1510 RFC 6113 RFC 6114 RFC 7800 |
gptkbp:isCompatibleWith |
Active Directory
|
gptkbp:isEnhancedBy |
public key cryptography
|
gptkbp:isIntegratedWith |
LDAP
|
gptkbp:isLocatedIn |
various operating systems
|
gptkbp:isNotableFor |
low-latency environments
|
gptkbp:isPartOf |
network protocols
security policies security protocols RFC 4120 network security frameworks |
gptkbp:isSubjectTo |
security audits
|
gptkbp:isSupportedBy |
Linux
Windows macOS |
gptkbp:isUsedBy |
various applications
|
gptkbp:isUsedFor |
access control
identity verification secure communications |
gptkbp:isUsedIn |
VPNs
cloud services enterprise environments network security web applications email services file sharing services remote access services database authentication |
gptkbp:isVulnerableTo |
man-in-the-middle attacks
|
gptkbp:operatesIn |
client-server model
|
gptkbp:provides |
secure authentication
|
gptkbp:requires |
secure time synchronization
|
gptkbp:supports |
single sign-on
|
gptkbp:timePeriod |
to prevent replay attacks
|
gptkbp:usedIn |
Key Distribution Center (KDC)
|
gptkbp:uses |
symmetric key cryptography
authentication tickets |