The user does nothing, all the work is done via smoke and mirrors. The
session is initiated once the user enters their password via the Citrix
Client, The Citrix client then requests authentication via the router
. The router sends a auth request to the server inside, the server then
initiates a kerebos session back to the router to the client. The client
does not even know what is going on around the session
/m
At 08:43 PM 7/17/00 -0500, Frank Knobbe wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> > Sent: Monday, July 17, 2000 4:40 PM
> >
> > The mechanism that allows the user to log is transparent..
> > The user has no
> > clue that they are being authenticated by RADIUS or TACACS,
> > and that their
> > session is kerberized.
> >
> > The users do not login to Citrix via telnet.
>
>No shit. I know that they do not use telnet to login to Citrix. But
>how, if not using telnet or similar, do they authenticate against the
>Cisco firewall?
>
>Earlier you wrote:
> > 1. The user on Host A initiates a Kerberized application (such as
> > Telnet)
>to Host B.
>
>So if the users initiates a Kerberized application, what does the
>user do? Is it that hard for you to describe that?
>
>Geez indeed...
>
>Regards,
>Frank
>
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP Personal Privacy 6.5.1
>Comment: PGP or S/MIME (X.509) encrypted email preferred.
>
>iQA/AwUBOXO2O0RKym0LjhFcEQLXtwCdEdr8RzxFJV5I0LZQLP73+xPgrZAAoNZ2
>oybUYnd75kSH+ppfhrrvaf/y
>=tB3h
>-----END PGP SIGNATURE-----
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]