Home/Glossary/Kerberos

Kerberos

A network authentication protocol that uses secret-key cryptography and trusted third parties to verify user and service identities without transmitting passwords.

Identity & Access ManagementAlso called: "Kerberos protocol", "Kerberos authentication"

Kerberos provides strong mutual authentication for client-server applications, forming the backbone of Windows Active Directory authentication and many enterprise single sign-on implementations.

Why it matters

  • Passwords never traverse the network, eliminating credential interception risks.
  • Enables single sign-on across network services without repeated authentication.
  • Provides mutual authentication, verifying both client and server identities.
  • Standard protocol for Windows domain authentication and many Linux/Unix environments.

Key concepts

  • Key Distribution Center (KDC): Trusted server containing Authentication Server (AS) and Ticket Granting Server (TGS).
  • Ticket Granting Ticket (TGT): Initial ticket obtained after authentication, used to request service tickets.
  • Service Ticket: Credential presented to access a specific service.
  • Principal: Unique identity for users, services, or hosts (user@REALM or service/host@REALM).
  • Realm: Authentication administrative domain, typically uppercase domain name.

Authentication flow

  1. User authenticates to AS, receives TGT encrypted with user's password hash.
  2. User requests service ticket from TGS using TGT.
  3. TGS issues service ticket encrypted with target service's key.
  4. User presents service ticket to access the resource.
  5. Service decrypts ticket with its key, authenticates the user.

Security considerations

  • Protect the KDC as compromise enables forging any ticket (Golden Ticket attack).
  • Monitor for anomalous ticket requests indicating Pass-the-Ticket attacks.
  • Implement strong password policies since TGTs are encrypted with password hashes.
  • Use AES encryption instead of legacy RC4 to prevent cracking attacks.
  • Synchronize time across all systems; Kerberos requires clocks within 5 minutes.

Common attacks and defenses

  • Kerberoasting: Requesting service tickets for offline password cracking. Defend with strong service account passwords.
  • Golden Ticket: Forged TGT using compromised KRBTGT hash. Defend by rotating KRBTGT password twice.
  • Silver Ticket: Forged service ticket using compromised service account. Defend with Privileged Access Management.
  • Pass-the-Ticket: Stolen ticket reuse. Defend with Credential Guard and ticket lifetime limits.