Alice has to share a long-term key with … 1. Alice requests permission from the Kerberos server … is allowed to log on to the Bob … is. If she isn't, the protocol will fail … [encrypted with Bob's long-term key] … and a session key she can use to … [p. 149] 5. Alice sends Bob both the ticket … [built with the session key and Alice's long-term key] … 6. Bob validates everything. If it all checks … [The Kerberos server] gives Alice a ticket that she can … the Kerberos server.
Google-1
Google-2
Copyright clearance needed for quotation.