[EMAIL PROTECTED] writes: > Well, obviously, if you want to be able to run pagsh without > tokens, you can't have it permitted only to system:authuser. ...stuff deleted... > Machine acl's might also be a solution, > if you're really worried about people making off with your binaries. Actually, this is one in the same thing. IP addresses that appear in your protection server (afs 3.2) will be handled as system:authuser even if you're not klog'd yet. So you could have system:authuser set and not be authenticated but still execute programs in your bin directory, and not have system:anyuser set. I don't know how this would work if you were using a protocol translator. < Paul
- Re: PAG Instructions, Please Bill Fithen
- Re: PAG Instructions, Please Joseph_Jackson
- Re: PAG Instructions, Please Michael Niksch; +41-1-7248-913
- RE: PAG Instructions, Please Randolph J. Herber, CD/DCD/SPG, x2966
- Re: PAG Instructions, Please Joseph_Jackson
- Re: PAG Instructions, Please Randolph J. Herber, CD/DCD/SPG, x2966
- Re: PAG Instructions, Please Perry E. Metzger
- Re: PAG Instructions, Please Michael T. Stolarchuk
- Re: PAG Instructions, Please mdw
- Re: PAG Instructions, Please Peter Lister, Cranfield Computer Centre
- Re: PAG Instructions, Please Paul Howell
- Re: PAG Instructions, Please Joseph_Jackson
- Re: PAG Instructions, Ple... Scott Dawson
- Re: PAG Instructions, Please Allen Hebert
- Re: PAG Instructions, Please Randolph J. Herber, CD/DCD/SPG, x2966
- Re: PAG Instructions, Please Randolph J. Herber, CD/DCD/SPG, x2966
- Re: PAG Instructions, Please Jon S. Stumpf
- Re: PAG Instructions, Please Paul Howell
- Re: PAG Instructions, Please Joseph_Jackson
- Re: PAG Instructions, Ple... Pat Wilson
