There are two things you need to do: authenticate and then authorize.

C-Kermit provides hooks to organizations in the form of two functions:

  X509_to_user() - who does this certificate represent

  X509_userok()  - may the user gain access with this certificate

C-Kermit provides two implementations by default.  One that maps the
UID to the user; and the other that maps the Alt-Name to the user.

  http://www.kermit-project.org/security.html#xa3.11.2

However, you do not have to trust the certificate subject.  If you
want you can have the owner of the certificate submit the certificate
to you out of band.  You can then store in a database or directory the
certificate (or its fingerprint) and associate that with a username.
When the SSL handshake has successfully completed, grab the
certificate, look it up in the database or directory and then use the
username you have stored.

This is what is done at Universities that do not want to put any
personal information into the certificates.  

> 
> Ok, I get it. 
> But I would be happier if I would be able to authenticate not the
> certificate subject, but the public key itself. Maybe I'm not the kind of
> people that trust in others to do the job.
> Thanks a lot for your help.
> 
> Gastón Christen

 Jeffrey Altman * Sr.Software Designer     Kermit 95 2.0 GUI available now!!!
 The Kermit Project @ Columbia University  SSH, Secure Telnet, Secure FTP, HTTP
 http://www.kermit-project.org/            Secured with MIT Kerberos, SRP, and 
 [EMAIL PROTECTED]               OpenSSL.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to