Appendix A. Kerberos 245
use the services of a second authenticated principal (the server), it can get a
service ticket for this service by presenting its TGT to the Kerberos TGS. The
service ticket is then sent from the client to the server, which can use it to verify
the client’s identity.
This section describes the protocol that Kerberos uses to provide these services,
independent of a specific implementation. A more detailed rationale for the
Kerberos design can be found in the MIT article Designing an Authentication
System: a Dialogue in Four Scenes, which is available from:
http://web.mit.edu/kerberos/www/dialogue.html
Kerberos keys and initial setup
To encrypt the messages that are sent over the network, Kerberos uses a
symmetric encr ...