I am trying to create server that needs to authenticate clients using
Kerberos.
Assuming the clients are presenting a Kerberos Service Ticket to the Server,
I need a way to:
1. Unpack the ticket
2. Decrypt the encrypted part and recover the Session Key. (Assuming I have
have access to my Server's
Roger Upole wrote:
Thanks very much for responding to this, Roger.
1) Not there
2) There but NULL
3) There and a (possibly empty) list of ACEs
In practice, cases 1 and 2 are functionally identical . Once a security
descriptor has
been applied to an object, the SE_DACL_PRESENT flag is always
Tim Golden wrote:
I *think* this is a bug (or at least an unfortunate effect)
but I'll post here first for a sanity check.
I'm looking at Windows security: descriptors, ACLs, etc. The
conventional wisdom is that a DACL (or an SACL but less commonly)
can be one of three things within a security d
I *think* this is a bug (or at least an unfortunate effect)
but I'll post here first for a sanity check.
I'm looking at Windows security: descriptors, ACLs, etc. The
conventional wisdom is that a DACL (or an SACL but less commonly)
can be one of three things within a security descriptor:
1) Not