{"author_name":"slowtrain2013","categories":["A to Z Information Security","\u6c17\u306b\u306a\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7528\u8a9e","\u6587\u5b66\u30fb\u8a9e\u5b66","\u8a8d\u8a3c\uff08\u8a18\u61b6\u30fb\u6240\u6301\u30fb\u751f\u4f53\uff09"],"url":"https://www.three-wise-monkeys.com/entry/2026/03/25/080000","provider_url":"https://hatena.blog","published":"2026-03-25 08:00:00","author_url":"https://blog.hatena.ne.jp/slowtrain2013/","version":"1.0","width":"100%","description":"Kerberos: The Three-Headed Guard Dog Kerberos is a special system that checks if you are who you say you are when you log into a computer network. It's named after a three-headed dog from Greek mythology that guarded the gates of the underworld! What is Kerberos? Imagine you work at a big company wi\u2026","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/s/slowtrain2013/20251109/20251109124122.png","provider_name":"Hatena Blog","height":"190","title":"Kerberos\uff08\u30b1\u30eb\u30d9\u30ed\u30b9\uff09\uff1aA to Z Information Security","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.three-wise-monkeys.com%2Fentry%2F2026%2F03%2F25%2F080000\" title=\"Kerberos\uff08\u30b1\u30eb\u30d9\u30ed\u30b9\uff09\uff1aA to Z Information Security - \u53e1\u667a\u306e\u4e09\u733f\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_url":"https://www.three-wise-monkeys.com/","type":"rich","blog_title":"\u53e1\u667a\u306e\u4e09\u733f"}