On Sun, 7 Nov 1999, Jeffrey Altman wrote:
> > I'm just mapping public keys (which you can extract from any certificate,
> > whoever signed it) to user-ids. This mapping is stored in a SQL database
> > contaning additional data, like what services the user can use, which urls
> > (s)he can access and the like.
> >
> > I'm using this aproach since more than 2 years (now with env. 1600 real
> > users) and it works very well.
>
> So you are saying that I can get a Verisign certificate for me
> claiming a mail address on your system and you will let me in?
Of course, if your public key isn't in my database, you don't have any
access ;-)...
>
>
> Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
> The Kermit Project * Columbia University
> 612 West 115th St #716 * New York, NY * 10025
> http://www.kermit-project.org/k95.html * [EMAIL PROTECTED]
>
>
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> User Support Mailing List [EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]