On Wed, 2004-02-18 at 12:17, Sensei wrote:
> Hi, I'm back.
> 
> I'm trying to set everything step-by-step. The first step is to set up 
> an authentication server.
> 
> We're using a linux server and a client. Now the client uses pam_krb5.so 
>    but I don't know if this is the right way to authenticate over an 
> insecure network.
Depends on how they log in, and what you mean by client.
The above sounds ok if you mean/want users at their physical box
to do kerberos authentication when they log on to the machine.
It's another matter if you mean log in via ssh/imap/some other service..
-- 
Nils Olav Sel�sdal
System Engineer
w w w . u t e l s y s t e m s . c o m



________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to