answersLogoWhite

0


Best Answer

TCP Port 88

User Avatar

Wiki User

βˆ™ 15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What ports are used by kerberos?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the default protocol used by windows vista?

Kerberos.


Do you use kerberos as an authentification method even when active directory forests are independent?

Yes the kerberos the std protocol used by AD earlier version used NTLM


Which version of Kerberos currently used by windows?

version 5.0


What is the default authentication protocol in an Active Directory network?

kerberos version 5 NTLM protocols are used by AD


Can kerberos be used in Linux as well as Windows domain environment?

Of course.


When was Kerberos Productions created?

Kerberos Productions was created in 2003.


What is the standard TCP port used for Kerberos authentication traffic in the US?

88 ??


In computer technology what is Kerberos designed to do?

"Kerberos" is a network security system, designed to prevent unauthorised access to sensitive data. The system is dependent on passwords and is used on computers operating in the Windows environment.


Is Kerberos a private key encryption?

Kerberos is an example of a private key encryption service.


How can you authenticate between forests?

Four types of authentication are used: (1) Kerberos and NTLM network logon for remote access to a server in another forest (2) Kerberos and NTLM interactive logon for physical logon outside the user's home forest (3) Kerberos delegation to N-tier application in another forest (4) UPN credentials.


When you log on to a local system does the Kerberos authentication protocol is used to communicate between the login dialog and the security subsystem?

No it does not.


What is kerberos realms?

A full service kerberos environment consisting of kerberos server and clients and application servers requires kerberos server to maintain a database containing users name and their hashed password and realm sets up aboundary within which authentication server can authenticate users. In general we can say realm is set of nodes sharing a common database.