summaryrefslogtreecommitdiffstats
path: root/src/windows/identity/help/html/welcome.htm
blob: a12c1d37df2eaa2e4d84da7530caec5da7bf5984 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
<html>
<head>
  <title>Welcome to the Network Identity Manager</title>
  <meta name="description" content="Welcome">
  <meta name="keywords" content="welcome">
  <link rel="stylesheet" type="text/css" href="nidmgr.css">
	<style>
</style>
</head>

<h1>Welcome to the Network Identity Manager</h1>

<div class="inline">
<img src="images/logo.jpg" width="100" height="100"/>
</div>

<p>Network Identity Manager (NetIdMgr) is a graphical 
tool designed to simplify the management of network identities and their credentials 
which are used by network authentication protocols while providing 
secure access to network services.&nbsp; When NetIDMgr is used with Kerberos v5 each 
network identity is a unique Kerberos principal name and the credentials 
are Kerberos v5 tickets.&nbsp; Kerberos v5 tickets can be used by NetIDMgr to 
obtain Andrew File System (AFS) tokens and X.509 public key certificates if the 
appropriate plug-ins are installed.</p>
<p>When you log into Microsoft Windows with a domain account, 
your account name and the Windows Domain name when combined form a Kerberos 
principal name.&nbsp; As an example, “WINDOWS\jaltman” is actually a short form 
representation of
jaltman@WINDOWS.SECURE-ENDPOINTS.COM.&nbsp;&nbsp; Microsoft Windows uses 
Kerberos-based network identities for all domain-based network authentications.&nbsp;
</p>
<p>Since Microsoft Windows already provides a network 
identity, why do you need NetIdMgr?&nbsp; Here are some examples:</p>
<ol>
	<li>Your only network identity is your Windows Domain 
	account but you have third-party applications that rely on MIT Kerberos for 
	authentication for access to remote files, e-mail, web data, or other 
	services.&nbsp; In this scenario, NetIdMgr will automatically import your Windows 
	Domain credentials into a form that can be used by applications that rely on 
	MIT Kerberos.</li>
	<li>You do not have a Windows Domain account but you must 
	obtain network credentials in order to securely access a network service.&nbsp; 
	In this scenario, NetIdMgr can be used to obtain new credentials for network 
	identities and can automatically renew them before they expire.</li>
	<li>You have Kerberos credentials for a network identity 
	and you have third-party applications that require an alternative form of 
	network credential, such as an AFS token or a X.509 certificate, which can 
	be obtained via a Kerberos authentication.&nbsp; In this scenario, NetIdMgr can 
	automatically use your existing credentials to obtain and renew the 
	additional network credentials types.</li>
	<li>You have a Windows Domain account but you need to 
	authenticate to a service belonging to a Kerberos realm outside the Windows 
	Domain.&nbsp; In this scenario, NetIdMgr can be used to manage multiple network 
	identities, the Windows Domain identity as well as the additional Kerberos 
	identity required for the external network services.&nbsp; </li>
	<li>You have multiple network identities within the same 
	Kerberos realm which are used for different roles.&nbsp; For example, an 
	unprivileged user identity and a privileged identity that is only meant to 
	be used for system administration.&nbsp; In this scenario, NetIdMgr can be used 
	to obtain credentials for all of your identities and automatically renew 
	them as necessary.</li>
</ol>
<p>NetIdMgr’s automated credential acquisition and renewal 
makes it an invaluable tool which provides users with a Single Sign-on 
experience. </p>
<p>NetIdMgr is most commonly configured as a StartUp item that runs an icon in the Taskbar Notification Area until you logout.&nbsp; 
While running, NetIDMgr automatically renews your credentials, notifies you of 
pending expirations and prompts you when a Kerberized application requires 
credentials that have not already been obtained.&nbsp; </p>
<p>When configured to do so, NetIdMgr will prompt you 
immediately after it starts to obtain Kerberos credentials.&nbsp; This is often 
referred to as logging on to Kerberos.&nbsp; NetIdMgr does not perform a logon in the 
sense of the Windows Logon Service.&nbsp; A logon service would do more than manage 
Kerberos tickets. A logon service would authenticate you to the local machine, 
validate access to your local file system and performs additional set-up tasks. 
These are beyond the scope of NetIdMgr. NetIdMgr simply allows you to manage 
Kerberos identities on behalf of compatible applications and to change your 
Kerberos password.</p>
<p>
NetIDMgr is distributed as a part of MIT Kerberos for Windows
along with the Kerberos v5 and Kerberos v4 plug-ins.  Plug-ins for additional 
credential types including AFS tokens and KCA certificates are available as 
separate distributions.&nbsp; The OpenAFS plug-in, which is required for supporting AFS tokens, is
distributed as part of <a href="http://www.openafs.org/windows.html">OpenAFS for 
Windows</a>.&nbsp; The KCA plug-in is distributed by
<a href="http://www.secure-endpoints.com/">Secure Endpoints Inc.</a></p>

<ul>
<li><a href="copyright.htm">Legal information</a></li>
<li><a href="bugs.htm">Reporting problems</a></li>
</ul>

<h3>Getting started</h3>

<ul>
<li><a href="concepts.htm">Network Identity Manager concepts</a></li>
<li><a href="using.htm">Using Network Identity Manager</a></li>
<li><a href="howdoi.htm">How do I ...</a></li>
<li><a href="menu_all.htm">All Menus</a></li>
</ul>

<h3>Information for developers</h3>

<p>
If you are interested in developing plug-ins or extending the features
of NetIDMgr, your first stop should be the NetIDMgr SDK which is included in the 
MIT Kerberos for Windows SDK.</p>

<p>
Contact the <a
href="mailto:netidmgr@secure-endpoints.com">netidmgr@secure-endpoints.com</a>
mailing list with questions or comments.</p>

<h3>External links</h3>

<ul>
<li><a class="external" href="http://web.mit.edu/kerberos">http://web.mit.edu/kerberos</a>:

MIT Kerberos distribution
</li>
<li><a class="external" href="http://www.openafs.org/windows.html">http://www.openafs.org/windows.html</a>:

OpenAFS for Windows
</li>
<li>
<a class="external" href="http://www.secure-endpoints.com/">http://www.secure-endpoints.com/</a>: 
Secure Endpoints Inc.</li>
</ul>

</html>