I'm truly a noob when it comes to Kerberos so I apologize in advance if my 
questions do not make much sense. I'm looking to propose a recommendation for 
my company to implement Kerberos v5 authentication in combination with LDAP 
authorization. We are currently using Sun ONE Directory Server  for simple bind 
authentication and authorization. I would like to know the following:

1) For web applications that currently rely upon LDAP for password info, it is 
my understanding that implementing Kerberos would require the password field 
for each user authenticating to the web app to be modified with an entry 
similar to the following: '{kerberos} [EMAIL PROTECTED],' at which point the 
Kerberos client would take over authentication. Is this a valid statement? Is 
it truly transparent to the web apps if the password mechanism is changed from 
simple bind to Kerberos?

2) Does SASL-GSSAPI using Kerberos provide me with any benefit other than 
enabling LDAP servers to securely authenticate with one another for replication 
purposes, or is it also the mechanism that enables the LDAP server to 
authenticate to KDC, similar to when a client using PAM_krb5 authenticates to 
KDC when requesting LDAP services ? Does anyone know if Sun One Directory 5.1 
or 5.2 come with SASL-GSSAPI plug-in or would I need to purchase the PADL 
product?

3) Is anyone familiar with Turbo Fredriksson's document "Implementing LDAPv3: 
OpenLDAP, Kerberos v5 and glue code for distributed data?" Is this the best 
model for integrating LDAP and Kerberos v5?

Your comments to above are appreciated.

-Mike
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to