Hi,
 
I am looking for advice and feedback from the Kerberos community in relation to UNIX, 
PAM and Kerberos. If you can provide me with some feedback based on your views and 
experiences it would be very much appreciated.
 
It is clear that PAM is becoming a common way to provide pluggable authentication 
services on UNIX or Linux operating systems. I am particularly interested in PAM for 
authorisation and wanted to hear from you about this. If you can help me, please 
provide feedback on the points listed below :
 
1. Do you, or the company you represent use Kerberos, or are you considering using 
Kerberos with PAM for authorisation, authentication, or both authentication and 
authorisation.
 
Note: Currently PAM with Kerberos can be used for authentication so that login to the 
operating system directly at console, or via telnet can be handled consistently. The 
use of PAM for authorisation would involve checking .k5login files in home directories 
and/or using an aname database on each system, or perhaps some other form of mechanism.
 
2. If you are using, or considering using PAM for authorisation I would like to hear 
if you using it with .k5login files, or checking authorisation via an LDAP lookup, or 
some other method. Can you provide details of your usage, or intended usage of PAM for 
authorisation ?
 
3. Do you have any GSS-API enabled applications, or any Kerberos enabled applications 
that accept a security context to determine the users principal name and then use PAM 
for authorisation, or do you have any applications that you would like have enabled in 
this way ?
 
Many thanks in advance for your help,
 
Tim Alsop
 
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to