Tag: ntlm

  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

  • Introduction to Authentication Frameworks (PAM and SSPI)

    This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…

  • SASL Authentication Mechanisms

    Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…