Mark Montague wrote:
> On November 29, 2011 16:28 , "J.Lance Wilkinson" <[email protected]> wrote:
>> I guess I'm confused that something which SEEMS as commonly needed as 
>> this kind
>> of feature would be, that there wouldn't be a cut/paste cookbook to 
>> implement
>> it.  Every example in these discussions (and I see there are a few) 
>> differ in
>> details and I've tried to model every one of them with no luck.
> 
> 
> I think what you are trying to do is really neat, and I agree that it 
> can be useful.  I've never needed to do it, though, because I've been 
> lazy and lucky and have always been able to configure my web 
> applications to use cosign for authenticating users and to use something 
> else (a client-side SSL certificate, or a "trusted" IP address) to 
> authenticate scripts.  The "Satisfy any" directive for Apache HTTP 
> Server is useful for this.
> Hopefully someone else -- someone who has written a script that 
> authenticates by emulating a web browser -- will be able to help with 
> the question you actually asked.
> 
> The overall flow should be:

...     4 steps clearly laying out what I need to do ...

> 
> I suspect that, from what you described, you are not performing steps 
> 3b-3e, all of which should be performed by the third curl command you 
> listed.  Try to get a better idea of what the third curl command is or 
> is not doing; the -v or --head options may be useful for this if the -w 
> you already have is not showing you what's happening.

        I'm beginning to suspect that my problem now is a scripting issue
        -- because when I MANUALLY execute the commands from my script, the
        same commands I originally cited in my post, and they coincide with
        your 4 steps precisely, I think, I DO get thru to the application on
        the POST -- enough to be refused BY THE REMOTE APPLICATION because of
        an *authorization error* -- so I know the CoSign *authentication* IS
        suceeding or I wouldn't be getting that far.  The CoSign authentication
        fails when I execute them together in my script, however.

> Again, I recommend using a different type of authentication for scripts, 
> such as client-side SSL certificates, if this is possible in your case.

        I'm not familiar of a way to set up authentication/authorization in
        Apache HTTPD, which is running the NAGIOS GUI I'm trying to work with
        that is already COSIGN protected, such that APACHE would do the
        client-side SSL authentication.  I suspect it would require that
        the NAGIOS GUI cgi script(s) effect the client-side SSL stuff, would
        it not?  And I don't have the resources/permissions to change it;
        wouldn't really want those anyway as I don't want to un-standardize
        it...

-- 
J.Lance Wilkinson ("Lance")             InterNet: [email protected]
Systems Design Specialist - Lead        Phone: (814) 865-4870
Digital Library Technologies            FAX:   (814) 863-3560
E3 Paterno Library
Penn State University
University Park, PA 16802

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Cosign-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/cosign-discuss

Reply via email to