How Kerberize an application
Kristen J. Webb
kwebb at teradactyl.com
Tue May 13 11:53:01 EDT 2008
Hi Carlos,
For these types of questions, you
should be on the kerberos at mit.edu
mailing list.
I'm currently involved in the process,
Here is a good overview of how things work:
http://www.kerberos.org/software/tutorial.html
Alf Wachsmann's tutorial in Linux Journal
explains setting up your KDC and more.
http://www.linuxjournal.com/article/7336
There are examples programs in the download.
I've also been using IBM's online documentation
as well (for example, krb5_rd_req).
http://publib.boulder.ibm.com/infocenter/systems/index.jsp?topic=/apis/krb5_rd_req.htm
Hope that helps,
Kris
Carlos Rainho wrote:
> Hello,
>
> I'm studying Science Computing in Gama Filho University at Rio de Janeiro,
> Brazil. In my final project, I will implement securtiy in ALua, an
> event-driven communication mechanism for developing distributed parallel
> applications based on the interpreted language Lua (http://www.lua.org).
>
> One way of this implementation is the usage of Kerberos. So, I need the
> modeling of kerberos in linux (Fedora 8) to kerberize commands in ALua that
> sends messages from one process for others processes in the same machine or
> not. Summarizing, I want to know how kerberize any application in Linux.
>
> I search for all the Internet, including site redhat.com, papers in
> CiteSeer, and no modeling was found.
>
> Can you help me?
>
> Thanks,
>
--
Mr. Kristen J. Webb
Teradactyl LLC.
PHONE: 1-505-242-1091
EMAIL: kwebb at teradactyl.com
VISIT: http://www.teradactyl.com
Home of the
True incremental Backup System
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5363 bytes
Desc: S/MIME Cryptographic Signature
Url : http://mailman.mit.edu/pipermail/krbdev/attachments/20080513/16c539ef/attachment.bin
More information about the krbdev
mailing list