Could you elaborate on how this would break the HTTP spec? I was
under the (admittedly naive) impression that more or less any
challenge-response authentication mechanism could be implemented in
HTTP via the HTTP 401 error code. So presumably I would think that
GSS context tokens could
Hi,
I am trying to configure krb5 on linux machine.
I have followed the instruction on the howto.
http://www.ofb.net/~jheiss/krbldap/howto.html
But when trying to login using telent - i get the following messages in
the log files.
Jul 28 18:27:00 xxx login[30815]: pam_krb5: authentication
Dear Kerberos Team
I downloaded Kerberos 5 on my Solaris 9
OS on AMD machine with x86 architecture. I am able to
run configure but not do make successfully. I am using
bash shell. Please help. I give the details below.
Thanks
Biswatosh
DETAILS:
I downloaded from MIT's site
Biswatosh == Biswatosh [EMAIL PROTECTED] writes:
Biswatosh gmake[2]: Entering directory `/krb5-1.4.1/src/util/ss'
Biswatosh rm -f libss.a
Biswatosh building static ss library
Biswatosh set -x; objlist=`set -x perl -p -e '$e=$ARGV; $e =~
Biswatosh s/OBJS\...$//; s/^/ /; s/
Biswatosh $//; s/ /
Sun's implementation of Java GSS/Kerberos will use the TGT from the
Subject, and obtain the Kerberos service Ticket. The Kerberos Service
Ticket is also stored in the Subject's private Credentials. After
successful Kerberos authentication, you can retrieve it from the JAAS
Subject.
Seema
Veeru