Solved

How to implement Kerberos with applications?

Posted on 2010-09-13
3
914 Views
Last Modified: 2012-05-10
Hello All,
I have been reading information on how to implement kerberos within applications that we have. I need some help understanding what I need to do.  I would like to use a java web application as an example.

1)  Once I have kerberos installed and configured, the service would be the server where my web application is located, correct?

2)  To get the client to use the java web application, I would need to write separate code using JAAS and Java GSS-API to allow authentication and authorization to occur?  I need an example to understand this concept or explanation.  At what point does the client begin using the web application? I am confused.  Is this new code inside my application or is it a separate application?

3) To be clear, once I have kerberos installed and configured, I use JAAS and Java GSS-API for a java application?  What if my application is not written in java, lets say it is written in Fortran on OpenVMS?  I know Kerberos is available on OpenVMS.

Thank you for your input.
0
Comment
Question by:OliviaRedhorse
  • 2
3 Comments
 

Author Comment

by:OliviaRedhorse
ID: 33676727
Just answer this answer for me.
At what point do I invoke my java web application to begin? For examples sake, lets say I have java web applications (app1 and app2) and the user would like to get to app1.  I am trying to understand where the Kerberos ends and my application begins.  Thank you!
0
 
LVL 5

Accepted Solution

by:
dcesari earned 500 total points
ID: 33680553
Answer to point 3)

If your application is written in Fortran and not in Java, then the only way to use Kerberos is to find a C API for Kerberos, Fortran can call C code in a more or less standard way, at lest if you have a fairly recent compiler, but not java code.

So for this purpose you need to find a C example of Kerberos web application (I do not know Kerberos, so I cannot help much) and mimic its behavior from Fortran.


0
 

Author Closing Comment

by:OliviaRedhorse
ID: 33793499
Thank you for replying.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Where to store the queries for modification of table 4 55
Java Server Faces parameter pass? 6 39
fibonacci ten numbers 4 28
use lov values 2 32
Java contains several comparison operators (e.g., <, <=, >, >=, ==, !=) that allow you to compare primitive values. However, these operators cannot be used to compare the contents of objects. Interface Comparable is used to allow objects of a cl…
Are you developing a Java application and want to create Excel Spreadsheets? You have come to the right place, this article will describe how you can create Excel Spreadsheets from a Java Application. For the purposes of this article, I will be u…
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
The viewer will learn how to implement Singleton Design Pattern in Java.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now