ZARAZA writes:
>
> Dear Vic Abell,
> 
> Imagine  you're  coming  to your president's room
> 
>  Secretary: do you have an appointment?
>  Mr. Abell: Yes, my name is Vic Abel

In this new an suspicious age, that wouldn't be the exchange.
It would be:

Secretary: Do you have an appointment?
Mr. Abell: Yes, my name is Vic Abell
Scretary: May I please see some identification?
Mr. Abell: Yes, here is my picture ID card, or my retina scan,
           or my X.509 certificate, or my fingerprint, or ...

Now that the scretary has authenticated me, authorization can proceed.

>  Secretary  gets  your  name and looks into timetable and finds required
>  record  (that's  authorization  is).  Than she checks time and name are
>  valid (it's authentication).
> 
>  Secretary: Oh, yes, Mr. Abell, you can come in.
> 
> You  can't  authenticate  user before you authorize him just because you
> don't know if information provided by user is valid or not.

I don't think someone should be authorized before the claimed identity
has been authenticated.  Otherwise authorization might be given to
someone falsely claiming an identity.

Vic 

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to