Print

Print


On Friday 03 December 2004 03:32, Andrew Hanushevsky wrote:
> The other alternative is to enable authentication and provide an access
> control file that specifies what can be access by whom. This is documented
> in the Security reference manual. Currently, only Kerberos 4 and Kerberos 5
> authentication is supported.

Pete's solution of having the user who is runnig xrootd and who is owning the 
files is very experiment centric.  That's not realistic in the long term.

Krb4 sounds like a good solution ist there a HOWTO that describes how to setup 
things?  Does this also solve problems with permissions for individual users 
and also in writing?  

Cheers, Rolf

-- 
contacts: http://www.physi.uni-heidelberg.de/~dubitzky