How Kerberize an application

Kevin Koch kpkoch at MIT.EDU
Tue May 13 15:01:35 EDT 2008


Brian Tung's Kerberos book has examples of how to call Kerberos functions in
your code.

ISBN 0201379244.

http://www.amazon.com/Kerberos-Network-Authentication-Addison-Wesley-Network
ing/dp/0201379244/ref=sr_1_1?ie=UTF8&s=books&qid=1210702842&sr=8-1

Kevin Koch
Kerberos for Windows Lead Software Engineer
MIT Kerberos Consortium http://www.kerberos.org
Massachusetts Institute of Technology
304 Vassar St. W92-143
Cambridge, MA 02139
617-324-8949
kpkoch at mit.edu

-----Original Message-----
From: krbdev-bounces at MIT.EDU [mailto:krbdev-bounces at MIT.EDU] On Behalf Of
Carlos Rainho
Sent: Tuesday, May 13, 2008 9:30 AM
To: krbdev at mit.edu
Subject: How Kerberize an application

Hello,

I'm studying Science Computing in Gama Filho University at Rio de Janeiro,
Brazil. In my final project, I will implement securtiy in ALua, an
event-driven communication mechanism for developing distributed parallel
applications based on the interpreted language Lua (http://www.lua.org).

One way of this implementation is the usage of Kerberos. So, I need the
modeling of kerberos in linux (Fedora 8) to kerberize commands in ALua that
sends messages from one process for others processes in the same machine or
not. Summarizing, I want to know how kerberize any application in Linux.

I search for all the Internet, including site redhat.com, papers in
CiteSeer, and no modeling was found.

Can you help me?

Thanks,

-- 
Carlos Rainho
...




More information about the krbdev mailing list