How Kerberize an application
John W. M. Stevens
john at betelgeuse.us
Tue May 13 19:50:10 EDT 2008
On Tue, May 13, 2008 at 03:01:35PM -0400, Kevin Koch wrote:
> Brian Tung's Kerberos book has examples of how to call Kerberos functions in
> your code.
> ISBN 0201379244.
> Kevin Koch
> Kerberos for Windows Lead Software Engineer
> MIT Kerberos Consortium http://www.kerberos.org
> Massachusetts Institute of Technology
> 304 Vassar St. W92-143
> Cambridge, MA 02139
> kpkoch at mit.edu
> -----Original Message-----
> From: krbdev-bounces at MIT.EDU [mailto:krbdev-bounces at MIT.EDU] On Behalf Of
> Carlos Rainho
> Sent: Tuesday, May 13, 2008 9:30 AM
> To: krbdev at mit.edu
> Subject: How Kerberize an application
> I'm studying Science Computing in Gama Filho University at Rio de Janeiro,
> Brazil. In my final project, I will implement securtiy in ALua, an
> event-driven communication mechanism for developing distributed parallel
> applications based on the interpreted language Lua (http://www.lua.org).
> One way of this implementation is the usage of Kerberos. So, I need the
> modeling of kerberos in linux (Fedora 8) to kerberize commands in ALua that
> sends messages from one process for others processes in the same machine or
> not. Summarizing, I want to know how kerberize any application in Linux.
I developed something that sounds similiar to this for Ruby. I've never
heard of Alua, but I'm betting the design patterns will be similar.
Feel free to email me higher level (design, pattern or reasoning) questions
if you think I could be of help.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: Digital signature
Url : http://mailman.mit.edu/pipermail/krbdev/attachments/20080513/a6d1f62d/attachment.bin
More information about the krbdev