From fc3b2a4015dc323ea7a4913af17bb6c38d1cb042 Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Fri, 30 Jun 2023 18:54:53 +0100 Subject: [PATCH] chore: add resource under cyber-security:networking-knowledge:auth-methodologies:kerberos --- .../112-auth-methodologies/100-kerberos.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md index 56aa9fbc5..7468ad0d8 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md @@ -33,3 +33,5 @@ Here is a high-level summary of the Kerberos authentication process: - **Complexity**: The protocol can be complex to set up and requires proper management of secret keys. In summary, Kerberos is a robust and widely used authentication protocol that helps secure client/server communications. Its centralized management and strong security measures make it an excellent choice for organizations with demanding authentication requirements. However, it also has its limitations and complexities that must be carefully managed to maintain a secure and efficient authentication process. + +- [Kerberos authentication process](https://youtu.be/_44CHD3Vx-0) \ No newline at end of file