Hi

I'm no security expert, but the impression I get from other products that do security checking on behalf of other users, is that, as someone earlier posted, a RACROUTE is performed using the subject's userid. It seems inappropriate to have to muck with
the TCB.
You are propably right.
In my structure , an authorised server starts different user subtasks in user key etc.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
Mit freundlichen Grüßen / Best regards

Miklos Szigetvari

ISIS Information Systems GmbH
Alter Wienerweg 12
2344 Maria Enzersdorf
Austria

---------------------------------------------------------------
This e-mail is only intended for the recipient and not legally
binding. Unauthorised use, publication, reproduction or
disclosure of the content of this e-mail is not permitted.
This email has been checked for known viruses, but ISIS accepts
no responsibility for malicious or inappropriate content.
---------------------------------------------------------------
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to