On 11/05/2018 02:43 PM, Ben Greenfield via TUHS wrote:
I found that I had to do all of this using SASL.
At first read I was thinking "SASL? Really?". Then I remembered that
Simple Authentication and Security Layer is really just an abstraction
layer. An abstraction layer that very easily could have (but I don't
know one way or the other) a back end to Kerberos.
I remember it as SASL would handle the kerberization
during boot up
getting tickets for each LDAP entry that you wanted mapped to a service
on that client.
Hum.
I could be wrong but I think SASL seems to be way
connect services on
Linux with LDAP that are served kerberized.
I've always viewed SASL as a way for applications to outsource the
authentication / security so that the program code didn't need to worry
about it. It also allowed SASL to manage supporting all the different
back end security methods.
I also think much the same about PAM. - In fact, I don't think I could
properly differentiate between PAM and SASL.
--
Grant. . . .
unix || die