A client has asked us to Kerberize our product. I have looked through
the FAQ's and Web sites and I understand what is going on.
But I have been unable to find a guide, manual, or example on how to
Kerberize the code for an application.
Most of the Unix-based Kerberos distributions include sample applications
in them to give you an idea of where to start. However ... what you need
to look at really depends on the protocol you're using. Are you using a
protocol such as IMAP that already has Kerberos in it's framework?
If so, then the best bet is to look at other example implementations of
IMAP that also do Kerberos to get an idea of the sorts of things you need
to do. If you've got your own protocol, you're going to have to figure
out how Kerberos fits into your protocol's framework, and use one of the
sample applications as a starting point.
--Ken
Kerberos mailing list [EMAIL PROTECTED]
http://mailman.mit.edu/mailman/listinfo/kerberos