I just finished chapter 1 of Darril's book and I'm still not sure I understand the relationships between authentication/authorization in a Windows LAN environment. I created the diagram below.
I think I got the RAS nailed. A remote PC contacts a RAS Server (VPN Concentrator in this diagram) and uses PAP, CHAP, MS-CHAP, or MS-CHAP v2 protocols to exchange authentication information with the VPN Concentrator. The VPN Concentrator can either have a local database or proxy the request to a RADIUS or TACACS+ (Cisco Only) server.
However, when we look at the LAN and Kerberos, the relationships are not so clear and I've attempted to diagram how it is looking in my mind. As I have it, a local machine goes to the Kerberos server for a ticket which it can then submit to other servers/resources. The Kerberos server only authenticates and does not authorize. For that functionality, the Kerberos server can use either a Win AD server (domain controller), LDAP, or TACACS+. The Windows AD server could actually proxy to an LDAP server itself as well. Do I have this right?
Or is it the case that Kerberos simply issues the tickets and then the user presents that ticket to each of the resources it needs and authorization is done at that time via whatever means the resource uses to authorize?
Thanks
Carl S.
Check out my personal certification journey blog
Carl's Certification Journey | The road to getting certified can often be bumpy