On Tue, Jan 22, 2002 at 12:27:14PM -0500, Sam Hartman wrote: > >>>>> "Paul" == Paul Jakma <[EMAIL PROTECTED]> writes: > >> I am aware of no widely deployed Kerberos applications without > >> authorization support. > > Paul> pam_krb5? > > The pam_krb5 I use certainly checks .k5login in the account step.
It probably calls krb5_kuserok(), which, if (~/.k5login does not exist AND username == krb5_aname_to_lname(client_principal)) returns true. OTOH, if ~/.k5login exists and the client principal name is not listed in it, access is denied, even if the client's principal name maps to the requested username. Cheers, Nico -- -DISCLAIMER: an automatically appended disclaimer may follow. By posting- -to a public e-mail mailing list I hereby grant permission to distribute- -and copy this message.- Visit our website at http://www.ubswarburg.com This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e-mail transmission. If verification is required please request a hard-copy version. This message is provided for informational purposes and should not be construed as a solicitation or offer to buy or sell any securities or related financial instruments.