One more question, what is the exact use of context delegation flag if it
doesn't need to be same on initiator and acceptor side.


On Fri, May 17, 2013 at 9:54 PM, Vipul Mehta <vipulmehta.1...@gmail.com>wrote:

> On Fri, May 17, 2013 at 8:31 PM, Greg Hudson <ghud...@mit.edu> wrote:
>
>> The GSSAPI doesn't distinguish between different kinds of credential
>> delegation.  But if you use GSS_C_ACCEPT rather than GSS_C_BOTH acceptor
>> credentials, then constrained delegation won't be used, and you will be
>> able to tell whether traditional Kerberos ticket forwarding was used.
>>
>> In my case it is like acceptor can use delegated credentials or its own
> credential for initiation on the basis of certain conditions, so GSS_C_BOTH
> is required. Now there seems to be no way to check whether client has
> delegated the credential or not.
>
>
>
>> > What about the java implementation of GSS ? Looks like there it works
>> fine.
>>
>> Does it support constrained delegation?  If it doesn't, then the
>> behavior difference isn't surprising.
>>
>> As far as i know about constrained delegation is that only a set of
> acceptors are allowed to use the delegated credential within the domain. No
> idea if this feature is supported by java, may be it is not. Would it be
> too much if you can add a condition that context delegation flag on
> acceptor side should not be set if client hasn't delegated the credential ?
> It seem to be logical too, in the implementation, this flag is set only if
> acceptor can acquire valid delegated credential.
>
> --
> Regards,
> Vipul
>



-- 
Regards,
Vipul
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to