On Wed, 2004-02-18 at 12:17, Sensei wrote: > Hi, I'm back. > > I'm trying to set everything step-by-step. The first step is to set up > an authentication server. > > We're using a linux server and a client. Now the client uses pam_krb5.so > but I don't know if this is the right way to authenticate over an > insecure network. Depends on how they log in, and what you mean by client. The above sounds ok if you mean/want users at their physical box to do kerberos authentication when they log on to the machine. It's another matter if you mean log in via ssh/imap/some other service.. -- Nils Olav Sel�sdal System Engineer w w w . u t e l s y s t e m s . c o m
________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos
