Tag: cybersecurity

  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • Introduction to Authentication Frameworks (PAM and SSPI)

    This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…

    Read
  • SASL Authentication Mechanisms

    Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…

    Read
  • OAuth 2.0 and OIDC 1 of 2

    OAuth 2.0 and OpenID Connect (OIDC 1.0) are different but highly related protocols and they are often confused. When we talk about IAM (identity and…

    Read
  • Lightweight Directory Access Protocol (LDAP)

    Introduction Originally LDAP only refers to the connectivity protocol to the directory server. This term is being used loosely today and it also refers to…

    Read
  • Cryptography basics 2 of 2

    My previous post outlines several core concepts around cryptography, such as asymmetric key encryption, digital certificate, the encoding formats and relevant file extensions. In this…

    Read