Murder Authentication Methods
anthony mayes
anmayes at siue.edu
Wed Oct 1 15:24:04 EDT 2003
We would like to implement a murder including 2 frontends and 3+
backends in a switched (or vpn) environment. After reading the
cyrus-info archives and the documents included in the Cyrus source, we
are unclear about the authentication process between the front and the
back ends. We would like to avoid using Kerberos if at all possible
being as we do not have an existing Kerberos installation. What
authentication methods would be best suited for this environment?
--
Anthony Mayes
UNIX Server Administration
Southern Illinois University Edwardsville
anmayes at siue.edu
More information about the Info-cyrus
mailing list