> I'm just mapping public keys (which you can extract from any certificate,
> whoever signed it) to user-ids. This mapping is stored in a SQL database
> contaning additional data, like what services the user can use, which urls
> (s)he can access and the like.
>
> I'm using this aproach since more than 2 years (now with env. 1600 real
> users) and it works very well.
So you are saying that I can get a Verisign certificate for me
claiming a mail address on your system and you will let me in?
Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
The Kermit Project * Columbia University
612 West 115th St #716 * New York, NY * 10025
http://www.kermit-project.org/k95.html * [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]