TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: John Beckett
from: Ellen K.
date: 2005-09-13 20:39:24
subject: Re: pass-through credentials

From: Ellen K. 

OK, delegation is what I meant and Hrvoje's message doesn't change anything.

On Mon, 12 Sep 2005 19:32:29 +1000, John Beckett
 wrote in message
:

>Ellen K.  wrote in message
>news::
>> Is this different from Delegation?  If so, how?
>
>This is a really heavy topic. The brief answer is no.
>
>If a domain user at a workstation accesses a share on a server, the
>workstation sends the user's credentials to the server. In principle, the
>server asks a domain controller to authenticate the user (in practice,
>using Kerberos, the client sends the server all it needs). This is a
>transitive network logon.
>
>Probably in the context that you are wondering about, a domain user at a
>workstation runs a client app that sends a request to server1. To fulfill
>the request, server1 asks server2 to do something (e.g. a database
>transaction). Server1 uses the user's credentials when sending the request
>to server2, so the transaction is executed with the privilege of the user,
>not the privilege of server1 or server2. That process is known as
>delegation of authentication. The client authorises server1 to represent
>the client. A domain admin has to specify that server1 is trusted to
>perform delegation (i.e. the software running on server1 is known to be
>good, and won't misuse its ability to authenticate as users).
>
>John

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.