Hi
I'm no security expert, but the impression I get from other products that
do security
checking on behalf of other users, is that, as someone earlier posted, a
RACROUTE is
performed using the subject's userid. It seems inappropriate to have to
muck with
the TCB.
You are propably right.
In my structure , an authorised server starts different user subtasks in
user key etc.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
--
Mit freundlichen Grüßen / Best regards
Miklos Szigetvari
ISIS Information Systems GmbH
Alter Wienerweg 12
2344 Maria Enzersdorf
Austria
---------------------------------------------------------------
This e-mail is only intended for the recipient and not legally
binding. Unauthorised use, publication, reproduction or
disclosure of the content of this e-mail is not permitted.
This email has been checked for known viruses, but ISIS accepts
no responsibility for malicious or inappropriate content.
---------------------------------------------------------------
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html