How Kerberize an application

John W. M. Stevens john at
Tue May 13 19:50:10 EDT 2008

On Tue, May 13, 2008 at 03:01:35PM -0400, Kevin Koch wrote:
> Brian Tung's Kerberos book has examples of how to call Kerberos functions in
> your code.
> ISBN 0201379244.
> ing/dp/0201379244/ref=sr_1_1?ie=UTF8&s=books&qid=1210702842&sr=8-1
> Kevin Koch
> Kerberos for Windows Lead Software Engineer
> MIT Kerberos Consortium
> Massachusetts Institute of Technology
> 304 Vassar St. W92-143
> Cambridge, MA 02139
> 617-324-8949
> kpkoch at
> -----Original Message-----
> From: krbdev-bounces at MIT.EDU [mailto:krbdev-bounces at MIT.EDU] On Behalf Of
> Carlos Rainho
> Sent: Tuesday, May 13, 2008 9:30 AM
> To: krbdev at
> Subject: How Kerberize an application
> Hello,
> I'm studying Science Computing in Gama Filho University at Rio de Janeiro,
> Brazil. In my final project, I will implement securtiy in ALua, an
> event-driven communication mechanism for developing distributed parallel
> applications based on the interpreted language Lua (
> One way of this implementation is the usage of Kerberos. So, I need the
> modeling of kerberos in linux (Fedora 8) to kerberize commands in ALua that
> sends messages from one process for others processes in the same machine or
> not. Summarizing, I want to know how kerberize any application in Linux.

I developed something that sounds similiar to this for Ruby.  I've never
heard of Alua, but I'm betting the design patterns will be similar.

Feel free to email me higher level (design, pattern or reasoning) questions
if you think I could be of help.

John S.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url :

More information about the krbdev mailing list