Re: How to set up NFS client for Kerberized access in Solaris

2004-05-06 Thread Alok Gore
I don't like realms that aren't upper case fully qualified domain names (fqdns). Your is upper case but not a fqdn. I can't say for sure when I was leading the SEAM team at Sun that this was ever attempted. Wyllys might know if this works. I'll try with the fqdn as the realm name. [EMAIL

Re: How to set up NFS client for Kerberized access in Solaris

2004-05-06 Thread Wyllys Ingersoll
Alok Gore wrote: Yes! In fact, that was the first source of my information. I have done everthing including the set-up of gsscred table only two things are not clear to me in the doc. 1) My KDC and the NFS Client server are not time-synchronized. But I have set the time manually on those machines

Re: How to set up NFS client for Kerberized access in Solaris

2004-05-06 Thread Wyllys Ingersoll
Alok Gore wrote: I don't like realms that aren't upper case fully qualified domain names (fqdns). Your is upper case but not a fqdn. I can't say for sure when I was leading the SEAM team at Sun that this was ever attempted. Wyllys might know if this works. I'll try with the fqdn as

Re: using multiple credential cache files in a server

2004-05-06 Thread Rick Macklem
[EMAIL PROTECTED] (Rick Macklem) wrote in message news:[EMAIL PROTECTED]... A gssd daemon for an NFS client needs to be able to use the GSS API call gss_init_sec_context() on behalf of different users (uids). I can see two ways of doing this: 1 - fork off a separate child that does

Re: using multiple credential cache files in a server

2004-05-06 Thread Alexandra Ellwood
You can do the same thing in MIT Kerberos with the function OM_uint32 KRB5_CALLCONV gss_krb5_ccache_name (OM_uint32 *minor_status, const char *name, const char **out_name); which allows you to set and/or