Kerberos-käyttäjätunnistusjärjestelmä

Modernit tietojärjestelmät ovat siirtyneet keskustietokone-arkkitehtuureista hajautettuun malliin, jossa verkon eri palvelut sijaitsevat eri puolilla tietoverkkoa. Verkon eri palvelut vaativat käyttäjän luotettavaa tunnistamista ja tätä varten on jo pitkään kehitetty erilaisia hajautettuja käyttäjät...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Olkinuora, Petteri
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2015
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/49151
_version_ 1826225799601061888
author Olkinuora, Petteri
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Olkinuora, Petteri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Olkinuora, Petteri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Olkinuora, Petteri
datasource_str_mv jyx
description Modernit tietojärjestelmät ovat siirtyneet keskustietokone-arkkitehtuureista hajautettuun malliin, jossa verkon eri palvelut sijaitsevat eri puolilla tietoverkkoa. Verkon eri palvelut vaativat käyttäjän luotettavaa tunnistamista ja tätä varten on jo pitkään kehitetty erilaisia hajautettuja käyttäjätunnistusjärjestelmiä. Kerberos-käyttäjätunnistusjärjestelmä on Massachusetts Institute of Technologyssä kehitetty hajautettu käyttäjän identiteetin tunnistamiseen kehitetty järjestelmä, joka on nk. Project Athenan yksi tuotos. Nykyään mm. Microsoft Windows verkot on rakennettu käyttämään Kerberosta käyttäjätunnistusjärjestelmänä. Modern information systems have moved from central computers to a distributed model where different network services are located across the network. Secure network services require user authentication and since the services are distributed across the network user authentication must support this. Kerberos autentication is a distributed user authentication protocoll which was developed in Massachusetts Institute of Technology and Kerberos is one of the results of Project Athena. Nowdays Kerberos is widelly spread because Microsoft Windows Domains use Kerberos as the default user authentication system.
first_indexed 2024-09-11T08:50:35Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Olkinuora, Petteri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49151", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Modernit tietoj\u00e4rjestelm\u00e4t ovat siirtyneet keskustietokone-arkkitehtuureista hajautettuun malliin, jossa verkon eri palvelut sijaitsevat eri puolilla tietoverkkoa. Verkon eri palvelut vaativat k\u00e4ytt\u00e4j\u00e4n luotettavaa tunnistamista ja t\u00e4t\u00e4 varten on jo pitk\u00e4\u00e4n kehitetty\nerilaisia hajautettuja k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelmi\u00e4. Kerberos-k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4 on Massachusetts Institute of Technologyss\u00e4 kehitetty hajautettu k\u00e4ytt\u00e4j\u00e4n identiteetin tunnistamiseen kehitetty j\u00e4rjestelm\u00e4, joka on nk. Project Athenan yksi tuotos. Nyky\u00e4\u00e4n mm. Microsoft Windows verkot on rakennettu k\u00e4ytt\u00e4m\u00e4\u00e4n Kerberosta k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4n\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Modern information systems have moved from central computers to a distributed model where different network services are located across the network. Secure network\nservices require user authentication and since the services are distributed across the network user authentication must support this. Kerberos autentication is a distributed user authentication protocoll which was developed in Massachusetts Institute of Technology and Kerberos is one of the results of Project Athena. Nowdays Kerberos is widelly spread because Microsoft Windows Domains use Kerberos as the default user authentication system.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Petteri Olkinuora (topeolki) on 2016-03-22 08:32:22.656535. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-03-22T08:32:23Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201603221916.pdf: 128260 bytes, checksum: a720838c1c1010830fd7332f905aee40 (MD5)\nlicense.html: 4793 bytes, checksum: 66f08ade5a3f7df28064b37c5c19f555 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-03-22T08:32:23Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201603221916.pdf: 128260 bytes, checksum: a720838c1c1010830fd7332f905aee40 (MD5)\nlicense.html: 4793 bytes, checksum: 66f08ade5a3f7df28064b37c5c19f555 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Kerberos k\u00e4ytt\u00e4j\u00e4tunnistus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Microsoft Kerberos", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "MIT Kerberos", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kerberos-k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201603221916", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_49151
language fin
last_indexed 2025-02-18T10:56:30Z
main_date 2015-01-01T00:00:00Z
main_date_str 2015
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/8d3c5fe0-95d0-4e6d-a361-ea2d0b16ff93\/download","text":"URN:NBN:fi:jyu-201603221916.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2015
record_format qdc
source_str_mv jyx
spellingShingle Olkinuora, Petteri Kerberos-käyttäjätunnistusjärjestelmä Kerberos käyttäjätunnistus Microsoft Kerberos MIT Kerberos Tietotekniikka Mathematical Information Technology
title Kerberos-käyttäjätunnistusjärjestelmä
title_full Kerberos-käyttäjätunnistusjärjestelmä
title_fullStr Kerberos-käyttäjätunnistusjärjestelmä Kerberos-käyttäjätunnistusjärjestelmä
title_full_unstemmed Kerberos-käyttäjätunnistusjärjestelmä Kerberos-käyttäjätunnistusjärjestelmä
title_short Kerberos-käyttäjätunnistusjärjestelmä
title_sort kerberos käyttäjätunnistusjärjestelmä
title_txtP Kerberos-käyttäjätunnistusjärjestelmä
topic Kerberos käyttäjätunnistus Microsoft Kerberos MIT Kerberos Tietotekniikka Mathematical Information Technology
topic_facet Kerberos käyttäjätunnistus MIT Kerberos Mathematical Information Technology Microsoft Kerberos Tietotekniikka
url https://jyx.jyu.fi/handle/123456789/49151 http://www.urn.fi/URN:NBN:fi:jyu-201603221916
work_keys_str_mv AT olkinuorapetteri kerberoskäyttäjätunnistusjärjestelmä