11-22-2004
By doing what you mentioned then it still defeats the purpose of ensuring that the user is authentic.? I can put any ID and test if that ID created the file.
typically, only the user should know their own password which would allow me to verify authenticity.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I am new to unix. I have a flat file that needs to be pgp encyrpted in ASCII format and ftped in Ascii format to remote location.
Can any one tell me the steps involved in the pgp encryption of the unix file. I will really appreciate if any one can help me with the pgp encryption shell... (1 Reply)
Discussion started by: rkumar28
1 Replies
2. Shell Programming and Scripting
All,
I want to encrypt a database system administration password into a file or environment variable. Then, I want to decrypt the password from the file or environment variable so nobody sees the clear text password.
For example, I have the database password of developement.
I need to... (1 Reply)
Discussion started by: bubba112557
1 Replies
3. UNIX for Advanced & Expert Users
I have an ascii file that I want to encrypt and save. I have seen this done before, but cannot remember how, nor can I find anything in any of my manuals or online help.
Any ideas how to do this?
Thanks,
Henry (6 Replies)
Discussion started by: hwollman53
6 Replies
4. Solaris
Hiiiiii..... every one.....
I have written a script, and i want to make that script confidential.So that, only i can see that script.
I am using " crypt " command in solaris 9, to encrypt that script.But when i am executing this... (6 Replies)
Discussion started by: prashantshukla
6 Replies
5. Shell Programming and Scripting
Hi,
Could you pls. help me in encryting a database password on Solaris 10 Box.
eg : username : test
password : t est123
The request is to encrypt the test123 so that no one can understand the what the password is ?
thanks (7 Replies)
Discussion started by: krackjack
7 Replies
6. Shell Programming and Scripting
Iam using the teradata...
and running the scripts in unix,
I wan to encrypt the teradata password in Unix...
my hostname is : bprod
usename: KRN777
passwrd: passwrd
can ant one tell me the exact command to encrypth the passwrd....
thanks, (5 Replies)
Discussion started by: nani1984
5 Replies
7. Shell Programming and Scripting
Hello All,
I need to accept a password from the user and validate it, without having to hard-code it anywhere. Any ideas? (3 Replies)
Discussion started by: optimus_1
3 Replies
8. Programming
I know that simply encrypting and decrypting passwords in a script is as bad as storing them in plain text, but I've been searching for an answer to this for a few days now, and haven't found an answer that fits the problem I'm having.
Here's the scenario. I'll give more details than I think may... (3 Replies)
Discussion started by: mdrisser
3 Replies
9. Solaris
Hello experts,
I am an PLM application admin, use AIX/SOlaris servers where application is installed
to schedule a cron in my system this what i do
Login to AIX/Unix system using an OS account,
Schedule a service to execute the required script - The script will have a PLM utility and... (4 Replies)
Discussion started by: kraghum
4 Replies
10. High Performance Computing
Hi,
i've got a qusetion regarding interconnect of compute nodes.
In our company we are running a Simulation Cluster which is administrated by the Simulation department. Now our central IT requires to encrypt the interconnect of the compute nodes.
Does anybody in that business encrypt... (3 Replies)
Discussion started by: fiberkill
3 Replies
LEARN ABOUT SUNOS
gss_auth_rules
gss_auth_rules(5) Standards, Environments, and Macros gss_auth_rules(5)
NAME
gss_auth_rules - overview of GSS authorization
DESCRIPTION
The establishment of the veracity of a user's credentials requires both authentication (Is this an authentic user?) and authorization (Is
this authentic user, in fact, authorized?).
When a user makes use of Generic Security Services (GSS) versions of the ftp or ssh clients to connect to a server, the user is not neces-
sarily authorized, even if his claimed GSS identity is authenticated, Authentication merely establishes that the user is who he says he is
to the GSS mechanism's authentication system. Authorization is then required: it determines whether the GSS identity is permitted to access
the specified Solaris user account.
The GSS authorization rules are as follows:
o If the mechanism of the connection has a set of authorization rules, then use those rules. For example, if the mechanism is Kerberos,
then use the krb5_auth_rules(5), so that authorization is consistent between raw Kerberos applications and GSS/Kerberos applications.
o If the mechanism of the connection does not have a set of authorization rules, then authorization is successful if the remote user's
gssname matches the local user's gssname exactly, as compared by gss_compare_name(3GSS).
FILES
/etc/passwd
System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ftp(1), ssh(1), gsscred(1M), gss_compare_name(3GSS), passwd(4), attributes(5), krb5_auth_rules(5)
SunOS 5.10 13 Apr 2004 gss_auth_rules(5)