> I'm just mapping public keys (which you can extract from any certificate,
> whoever signed it) to user-ids. This mapping is stored in a SQL database
> contaning additional data, like what services the user can use, which urls
> (s)he can access and the like.
> 
> I'm using this aproach since more than 2 years (now with env. 1600 real
> users) and it works very well.

So you are saying that I can get a Verisign certificate for me
claiming a mail address on your system and you will let me in?


    Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
                 The Kermit Project * Columbia University
              612 West 115th St #716 * New York, NY * 10025
  http://www.kermit-project.org/k95.html * [EMAIL PROTECTED]


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to