Kerberos Tickets
The Immutable Ticket of Identity
Section titled “The Immutable Ticket of Identity”Kerberos Tickets are the fundamental “Legal Tender” of the identity domain. They are opaque, cryptographically signed, and encrypted data structures that allow a central authority (The KDC) to vouch for a user’s identity to any service in the network. A Kerberos ticket ensures that “Who you are” and “What you can do” are bundled together in a way that is time-limited, single-use, and resistant to tampering. Whether it is a Ticket Granting Ticket (TGT) for broad domain access or a Service Ticket (ST) for a specific application, the ticket is the sovereign artifact that enables frictionless Single Sign-On across the entire enterprise mesh.
The Ticket Strategic Matrix
Section titled “The Ticket Strategic Matrix”Kerberos utilizes different types of tickets depending on the stage of the authentication journey and the target resource.
Strategic Ticket Types
Section titled “Strategic Ticket Types”| Artifact | Full Name | Strategic Purpose | Key Required to Open |
|---|---|---|---|
| TGT | Ticket Granting Ticket. | Proves the user has logged in to the domain. | The KDC’s Secret Key. |
| ST | Service Ticket. | Grants access to a specific service (SPN). | The Service’s Secret Key. |
| PAC | Privilege Attribute Cert. | Carries group and authorization data. | (Inside ST/TGT). |
| GSS-API | Generic Security Service. | Standard wrapper for ticket exchange. | (Varies). |
The Ticket Lifecycle
Section titled “The Ticket Lifecycle”A Kerberos ticket moves through a precise sequence of manufacture, delivery, and verification.
graph LR
Build[Manufacture PAC & SessKey] --> Wrap[Encrypt with Target Key]
Wrap --> Deliver[Deliver to Client]
Deliver --> Present[Present to Service]
Present --> Verify[Decrypt & Establish Context]
Manufacture & Bind
The KDC creates a **Session Key** and the **PAC (Privilege Attribute Certificate)**—which contains the user's SIDs and group memberships. It then bundles these together into the ticket body, ensuring the user's identity is mathematically bound to their current session.
Sealing the Payload
The entire ticket is encrypted using the secret key of the target service (e.g., the `krbtgt` account for a TGT or a SQL Server account for an ST). This means the user carrying the ticket can never read or modify its contents—it is a "Black Box" of identity proof.
Verification & Grant
When the target service receives the ticket, it uses its own secret key to decrypt the payload. It verifies that the ticket has not expired and that the session key matches the user's "Authenticator." Once verified, the service grants access based on the group data found in the PAC.
Technical Ticket Implementation
Section titled “Technical Ticket Implementation”Understanding ticket flags is critical for managing delegation and protocol transition.
Crucial Ticket Flags (Conceptual)
Section titled “Crucial Ticket Flags (Conceptual)”| Flag | Strategic Value | Function |
|---|---|---|
| FORWARDABLE | High. | Allows the ticket to be used for delegation to other services. |
| PROXIABLE | Medium. | Allows a service to act as a proxy for the user. |
| RENEWABLE | High. | Allows the ticket to be extended beyond its initial lifetime. |
| PRE-AUTHENT | Mandatory. | Proves the user entered their password before receiving the ticket. |
Kerberos Implementation Guides
Section titled “Kerberos Implementation Guides”Master the technical mechanics of ticket-based security and enterprise domain architecture.
Kerberos Overview
Strategic foundational principles for ticket-based authentication and security.
Authentication Flow
Tracing the movement of TGTs and Service Tickets through the multi-step identity handshake.
KDC Architecture
Understanding the internal "Mint" that manufactures and signs every ticket in the realm.
Delegation Patterns
Using special ticket flags to scale identity across multi-tier application environments.
Next Steps
Section titled “Next Steps”- Explore PAC Validation for performance and security nuances in large domains.
- Review Ticket Lifetime Policies for balancing security vs. user convenience.
- Check Kerberos Keytab Management for providing services with the keys they need to decrypt tickets.