Related Concepts

  • Directory: A hierarchical database containing all information and definitions of objects, such as users, groups, computers, and other resources, and their relationships within an organization

  • Domain: A logical entity that groups a set of objects under a single security policy and database

  • ACL: Access Control List is a set of permissions that defines who can do what to a specific AD object. It’s not an object like a user or group, but rather metadata attached to objects in the directory

  • GPO: Group Policy Object is a set of policy settings that can be applied to objects within a domain. Control a variety of settings, from security policies to software configurations

  • SAM: Security Account Manager is a local database on every Windows machine that stores local user accounts, groups, password hashes (NTML), and security identifiers (SIDs). It handles authentication and access control for local accounts

  • KDC: Key Distribution Center acts as the central authority in the Kerberos authentication process, issuing access tickets that validate the identity of users and services within the network

  • Client: The entity requesting access to a resource

  • Service: A resource that requires Kerberos authentication

  • SPN: Service Principal Name is a unique ID used to identify services in the domain

  • PAC: It carries detailed information that allows the application servers to know the rights and privileges of a user. It may or may not be included in TGT and TGS tickets

  • Realm: It is an administrative domain for Kerberos, generally corresponding to a domain in a network

  • S4U2self: Kerberos extension that allows a service to obtain a ticket for a specific user, even if the user is not logged in, usually where a service needs to act on behalf of a user

    S4U2proxy: Kerberos extension that allows a service to use a ticket obtained through S4U2self to request additional tickets to access other services on behalf of the user

Last updated