Murder Authentication Methods

anthony mayes anmayes at siue.edu
Wed Oct 1 16:26:30 EDT 2003


Rob Siemborski wrote:

>On Wed, 1 Oct 2003, anthony mayes wrote:
>
>  
>
>>We would like to implement a murder including 2 frontends and 3+
>>backends in a switched (or vpn) environment.  After reading the
>>cyrus-info archives and the documents included in the Cyrus source, we
>>are unclear about the authentication process between the front and the
>>back ends.  We would like to avoid using Kerberos if at all possible
>>being as we do not have an existing Kerberos installation.  What
>>authentication methods would be best suited for this environment?
>>    
>>
>
>Kerberos is best suited to this enviornment.  Seriously, it's deseigned to
>let services authenticate to eachother.  The murder has also been
>extensively tested in a Kerberos enviornment, and testing in other
>enviornments has been incidental at best.
>
>Failing that, DIGEST-MD5 or PLAIN+TLS (in Cyrus 2.2) are your best bets.
>
>
>  
>
Since we are in a sealed environment, we would like to try using 
DIGEST-MD5 (at least for testing).  It would be very much appreciated if 
someone would share their configuration files with us.  Thanks in advance.

-- 
Anthony Mayes
UNIX Server Administration
Southern Illinois University Edwardsville
anmayes at siue.edu

-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.andrew.cmu.edu/mailman/private/info-cyrus/attachments/20031001/301cf943/attachment.html


More information about the Info-cyrus mailing list