Hello Rolf
On Fri, 3 Dec 2004, Rolf Dubitzky wrote:
> On Friday 03 December 2004 03:32, Andrew Hanushevsky wrote:
> > The other alternative is to enable authentication and provide an access
> > control file that specifies what can be access by whom. This is documented
> > in the Security reference manual. Currently, only Kerberos 4 and Kerberos 5
> > authentication is supported.
>
> Pete's solution of having the user who is runnig xrootd and who is owning the
> files is very experiment centric. That's not realistic in the long term.
>
> Krb4 sounds like a good solution ist there a HOWTO that describes how to setup
> things? Does this also solve problems with permissions for individual users
> and also in writing?
There is no HOWTO but there is the documetation:
XRootd Security Configuration Reference
available on the xrootd web page (http://xrootd.slac.stanford.edu/)
Cheers,
Wilko
>
> Cheers, Rolf
>
> --
> contacts: http://www.physi.uni-heidelberg.de/~dubitzky
>
|