cyberp70 <[EMAIL PROTECTED]> writes:

> We currently use Kerberos for authentication for almost everything on
> our network.  Some people here are advocating switching to using LDAP
> for authentication (we already have a pretty well developed LDAP
> infrastructure).  This would of course require everyone to change their
> password as well the trauma of recoding applications that currently use
> Kerberos and haven't been converted to using PAM.

LDAP "authentication" is actually nothing more or less than using your
LDAP directory servers as a giant distributed /etc/shadow file.  You can
put the password checking in various places, but in the end you're
basically taking a step backwards towards something more like the
historical Unix authentication mechanism.

This means you lose all of the benefits of Kerberos (reusable credentials,
passwords never crossing the network encrypted or not, ticket forwarding,
etc.) in favor of something that's basically secure NIS.  If secure NIS is
something you're happy with, hey, great, but to me it feels like 1980s
security technology, long-since obsolete.

-- 
Russ Allbery ([EMAIL PROTECTED])             <http://www.eyrie.org/~eagle/>
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to