Hello Rolf On Fri, 3 Dec 2004, Rolf Dubitzky wrote: > On Friday 03 December 2004 03:32, Andrew Hanushevsky wrote: > > The other alternative is to enable authentication and provide an access > > control file that specifies what can be access by whom. This is documented > > in the Security reference manual. Currently, only Kerberos 4 and Kerberos 5 > > authentication is supported. > > Pete's solution of having the user who is runnig xrootd and who is owning the > files is very experiment centric. That's not realistic in the long term. > > Krb4 sounds like a good solution ist there a HOWTO that describes how to setup > things? Does this also solve problems with permissions for individual users > and also in writing? There is no HOWTO but there is the documetation: XRootd Security Configuration Reference available on the xrootd web page (http://xrootd.slac.stanford.edu/) Cheers, Wilko > > Cheers, Rolf > > -- > contacts: http://www.physi.uni-heidelberg.de/~dubitzky >