>A client has asked us to "Kerberize" our product. I have looked through >the FAQ's and Web sites and I understand what is going on. > >But I have been unable to find a guide, manual, or example on how to >Kerberize the code for an application.
Most of the Unix-based Kerberos distributions include sample applications in them to give you an idea of where to start. However ... what you need to look at really depends on the protocol you're using. Are you using a protocol such as IMAP that already has Kerberos in it's framework? If so, then the best bet is to look at other example implementations of IMAP that also do Kerberos to get an idea of the sorts of things you need to do. If you've got your own protocol, you're going to have to figure out how Kerberos fits into your protocol's framework, and use one of the sample applications as a starting point. --Ken ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] http://mailman.mit.edu/mailman/listinfo/kerberos
