okay, thank you very much.

On Wed, Jun 2, 2010 at 10:25 PM, dB. <dbl...@dblock.org> wrote:

> Yes. You can (and should) have a list of roles - everything the user that
> just logged in has access to / every role he has.
>
> cheers
> dB.
>
>
>
> dB. @ dblock.org
> Moscow|Geneva|Seattle|New York
>
>
> -----Original Message-----
> From: geofrey rainey [mailto:geofr...@gmail.com]
> Sent: Tuesday, June 01, 2010 10:13 PM
> To: Tomcat Users List
> Subject: Re: JAAS Realm Authentication with Kerberos
>
> Right, so let me get this straight; Presently the KerberosLoginModule saves
> the role information (defined as u...@realm) as a Principal which is then
> compared against the literal string defined in web.xml. So what you're
> suggesting is modify the KerberosLoginModule so that, essentially, the
> credentials saved in the (Role) Principal should reflect exactly what's in
> (under the Role) web.xml?
>
> thank you for your help.
>
> On Tue, Jun 1, 2010 at 11:56 PM, dB. <dbl...@dblock.org> wrote:
>
> > If you look at the KerberosLoginModule code, it wants to be modified to
> > retrieve roles from somewhere in your system. For example a user database
> > that says that u...@realm is "manager". Then you can say
> <auth-constraint>
> > ... manager </> in web.xml rather than u...@realm. Listing individual
> > users clearly isn't practical.
> >
> > Any authenticated user will be a member of "Everyone" or
> > "DOMAIN\Authenticated Users" or "DOMAIN\Users", etc.
> >
> > If you are using Active Directory on Windows, you're probably not getting
> > what you want with Kerberos alone. To use web.xml for authorization, you
> > want something like roles = AD groups (and local groups). Retrieving user
> > groups by name from AD is going to yield the wrong result in any kind of
> > real world deployment - you will have hard time getting nested groups or
> > anything from trusted domains.
> >
> > If you're running on Windows and your goal is single sign-on, you may
> want
> > to try http://waffle.codeplex.com. There're several options, including a
> > login filter and a JAAS authenticator. All use SSPI to login (will do
> > Kerberos and NTLM) and will return not just the user identity, but the
> user
> > local and domain groups.
> >
> > Hope this helps,
> > -dB.
> >
> >
> > dB. @ dblock.org
> > Moscow|Geneva|Seattle|New York
> >
> >
> > -----Original Message-----
> > From: geofrey rainey [mailto:geofr...@gmail.com]
> > Sent: Tuesday, June 01, 2010 4:05 AM
> > To: users@tomcat.apache.org
> > Subject: JAAS Realm Authentication with Kerberos
> >
> > Hello,
> >
> > I've been following this fairly self-explanatory document on Kerberos
> > authentication against an AD. If I hard-code the u...@realm in the
> web.xml
> > file, authentication is successful. However obviously what one really
> wants
> > is the actual user credentials as stored in the Principals class,
> > javax.security.auth.kerberos.KerberosPrincipal, in the web.xml for each
> > Subject authenticating, but I'm a bit lost as to how to get that
> > information
> > from the class into the web.xml. Any ideas would be appreciated?
> >
> >   (
> >
> >
> http://wiki.wsmoak.net/cgi-bin/wiki.pl?action=browse&diff=1&id=TomcatKerberosConfigOnly
> > )
> >
> >
> > <auth-constraint>
> >          <role-name>u...@realm</role-name>
> >  </auth-constraint>
> >
> >
> > Regards,
> > Geofrey.
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> > For additional commands, e-mail: users-h...@tomcat.apache.org
> >
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to