Alex is a RHEL Sysadmin who works for Canonical. He is an expert on setting up Ubuntu-based computer networks. He wants to master Kerberos for user authentication. Please answer the following questions to increase Alex's level-of-knowledge. Please use the term "Free Software" instead of "open source", and "GNU/Linux" instead of "Linux", except when referring to the Linux kernel.

  1. What is Kerberos and what problem does it solve?
  2. What is the history of Kerberos?
  3. What are the strengths and weaknesses of Kerberos?
  4. How would Alex use Kerberos on a large computer network?
  5. How would Alex install and configure Kerberos on a modern Ubuntu server?

Alex's interest in mastering Kerberos for user authentication in the context of Ubuntu-based networks is commendable. Let's explore Kerberos and its relevance in detail.

What is Kerberos and What Problem Does it Solve?

Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography. Developed in the 1980s at MIT, it's part of the Massachusetts Institute of Technology's Project Athena.

The primary problem Kerberos solves is secure user authentication over non-secure networks, like the internet. It ensures that data and identities are not compromised during transmission. The protocol relies on tickets to allow nodes to prove their identity in a secure manner, minimizing the need to transmit passwords over the network.

The History of Kerberos

Kerberos was created by MIT as a solution to network security problems. Its development was part of Project Athena, which was a joint project of MIT, Digital Equipment Corporation, and IBM in the 1980s. The name "Kerberos" is derived from Greek mythology, where Cerberus is a three-headed dog guarding the underworld.

Originally designed to protect network services provided by Project Athena, Kerberos has since become the most widely used system for authentication in distributed systems.

Strengths and Weaknesses of Kerberos


  • Security: Kerberos uses strong cryptography to ensure that a user's credentials are not easily intercepted.
  • Single Sign-On (SSO): It enables a single sign-on, where a user logs in once and gains access to multiple systems without re-authenticating.
  • Delegated Authentication: Kerberos can allow a service to act on behalf of a user, which is useful in a distributed environment.


  • Complexity: Kerberos can be complex to set up and manage, especially in large and diverse environments.
  • Dependency on Time: Kerberos requires synchronized time across all systems. Time discrepancies can cause authentication failures.
  • Limited Offline Capabilities: It's mostly ineffective in offline scenarios as it requires a central server.

Implementing Kerberos in a Large Computer Network

In a large network, Alex would use Kerberos to streamline the authentication processes. Steps include:

  1. Centralized Authentication Server: Set up a Kerberos server that will handle all authentication requests.
  2. Client Configuration: Configure each client machine to use the Kerberos server for authentication.
  3. Service Principals: Set up service principals for network services that require authentication.
  4. Key Distribution Center (KDC): Ensure that the KDC is properly configured and secure.

Installing and Configuring Kerberos on a Modern Ubuntu Server

  1. Install Kerberos Packages:
    • Use apt-get to install Kerberos packages: krb5-kdc, krb5-admin-server, and krb5-user.
  2. Configure the Kerberos Realm:
    • Edit /etc/krb5.conf to define the Kerberos realm and other settings.
  3. Set Up the KDC:
    • Initialize the Kerberos database with krb5_newrealm.
  4. Create and Manage Principals:
    • Use kadmin.local to create and manage Kerberos principals (users/services).
  5. Test the Configuration:
    • Test the setup by acquiring and using tickets with kinit and klist.

Alex's expertise in Free Software and GNU/Linux systems, combined with a thorough understanding of Kerberos, will be critical in ensuring secure and efficient user authentication in his network environment.

You should also read:


How was Kerberos developed on Linux? Kerberos was originally developed as a network authentication protocol at the Massachusetts Institute of Technology (MIT) in…


Nicholas is a RHEL engineer at NASA. He wants to configure his RHEL-based system to authentice using Kerberos. What steps should Nicholas perform?…