{"id":4063,"date":"2018-08-12T13:19:45","date_gmt":"2018-08-12T05:19:45","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=4063"},"modified":"2018-08-12T13:19:45","modified_gmt":"2018-08-12T05:19:45","slug":"kerberos%e7%9b%b8%e5%85%b3%e8%b5%84%e6%96%99%e6%94%b6%e9%9b%86","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/4063.html","title":{"rendered":"Kerberos\u76f8\u5173\u8d44\u6599\u6536\u96c6"},"content":{"rendered":"<p>=Start=<\/p>\n<h4 id=\"id-\u6a21\u677f-\u7f18\u7531\uff1a\">\u7f18\u7531\uff1a<\/h4>\n<p>\u6574\u7406\u4e00\u4e9b\u548cKerberos\u76f8\u5173\u7684\u8d44\u6599\uff0c\u65b9\u4fbf\u5728\u9700\u8981\u7684\u65f6\u5019\u53c2\u8003\u548c\u68c0\u7d22\u3002<\/p>\n<h4 id=\"id-\u6a21\u677f-\u6b63\u6587\uff1a\">\u6b63\u6587\uff1a<\/h4>\n<h5 id=\"id-\u6a21\u677f-\u53c2\u8003\u89e3\u7b54\uff1a\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n<h6><strong># Kerberos\u662f\u4ec0\u4e48\uff1f<\/strong><\/h6>\n<p>Kerberos\u662f\u4e00\u79cd\u7f51\u7edc\u8ba4\u8bc1\u534f\u8bae\uff0c\u5728\u4e92\u4e0d\u4fe1\u4efb\u7684\u7f51\u7edc\u4e2d\uff0cKerberos\u63d0\u4f9b\u4e86\u4e00\u79cd\u53ef\u9760\u7684\u4e2d\u5fc3\u5316\u8ba4\u8bc1\u534f\u8bae\uff0c\u4ee5\u4fbf\u7f51\u7edc\u4e2d\u7684\u5404\u4e2a\u673a\u5668\u4e4b\u95f4\u80fd\u591f\u76f8\u4e92\u8bbf\u95ee\u3002<\/p>\n<h6><strong># Kerberos\u5de5\u4f5c\u539f\u7406\u56fe<\/strong><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/kerberos.org\/images\/krbmsg.gif\" width=\"638\" height=\"532\" \/><\/p>\n<h6><strong># Kerberos\u8ba4\u8bc1\u6b65\u9aa4<\/strong><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/access.redhat.com\/webassets\/avalon\/d\/Red_Hat_Enterprise_Linux-6-Managing_Smart_Cards-en-US\/images\/d314590391f06f79ad4bc8433ab5480a\/kerberos.png\" width=\"893\" height=\"535\" \/><\/p>\n<p>&nbsp;<\/p>\n<h5 id=\"id-\u6a21\u677f-\u53c2\u8003\u94fe\u63a5\uff1a\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n<ul>\n<li><a href=\"http:\/\/kerberos.org\/software\/tutorial.html\">kerberos\u8ba4\u8bc1\u539f\u7406<\/a><br \/>\n<a href=\"http:\/\/web.mit.edu\/kerberos\/krb5-current\/doc\/\">http:\/\/web.mit.edu\/kerberos\/krb5-current\/doc\/<\/a><br \/>\n<a href=\"https:\/\/tools.ietf.org\/html\/rfc1510\">https:\/\/tools.ietf.org\/html\/rfc1510<\/a><\/li>\n<li><strong><a href=\"https:\/\/mp.weixin.qq.com\/s\/QXWByvPigsGTBwi2zMV8gA\">Kerberos\u8be6\u89e3<\/a><\/strong>#nice<\/li>\n<li><a href=\"https:\/\/mp.weixin.qq.com\/s\/-K2K22fLOz4Hl7MIUAJfRA\">\u7f8e\u56e2\u70b9\u8bc4\u6570\u636e\u5e73\u53f0Kerberos\u4f18\u5316\u5b9e\u6218<\/a><\/li>\n<li><a href=\"https:\/\/blog.csdn.net\/m1213642578\/article\/details\/52370705\">Kerberos\u539f\u7406\u89e3\u6790<\/a><\/li>\n<li><a href=\"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/managing_smart_cards\/using_kerberos\" target=\"_blank\" rel=\"noopener\">CHAPTER 3. USING KERBEROS<\/a><\/li>\n<li><a href=\"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/managing_smart_cards\/configuring_a_kerberos_5_server\">3.3. CONFIGURING A KERBEROS 5 SERVER<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Kerberos_%28protocol%29\">Kerberos (protocol)<\/a><\/li>\n<li><a href=\"https:\/\/danlebrero.com\/2017\/03\/26\/Kerberos-explained-in-pictures\/\">Kerberos explained in pictures<\/a><\/li>\n<li><a href=\"http:\/\/www.roguelynn.com\/words\/explain-like-im-5-kerberos\/\">Explain like I\u2019m 5: Kerberos<\/a><\/li>\n<li><a href=\"https:\/\/www.slashroot.in\/what-is-kerberos-and-how-does-kerberos-work\">What is kerberos and how does kerberos work<\/a><\/li>\n<\/ul>\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u6574\u7406\u4e00\u4e9b\u548cKerberos\u76f8\u5173\u7684\u8d44\u6599\uff0c\u65b9\u4fbf\u5728\u9700\u8981\u7684\u65f6\u5019\u53c2\u8003\u548c\u68c0\u7d22\u3002 \u6b63\u6587\uff1a \u53c2\u8003\u89e3\u7b54\uff1a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25,12],"tags":[1197],"class_list":["post-4063","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","category-tools","tag-kerberos"],"views":6344,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=4063"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4063\/revisions"}],"predecessor-version":[{"id":4064,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4063\/revisions\/4064"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=4063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=4063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=4063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}