Solved

How to implement Kerberos with applications?

Posted on 2010-09-13
3
903 Views
Last Modified: 2012-05-10
Hello All,
I have been reading information on how to implement kerberos within applications that we have. I need some help understanding what I need to do.  I would like to use a java web application as an example.

1)  Once I have kerberos installed and configured, the service would be the server where my web application is located, correct?

2)  To get the client to use the java web application, I would need to write separate code using JAAS and Java GSS-API to allow authentication and authorization to occur?  I need an example to understand this concept or explanation.  At what point does the client begin using the web application? I am confused.  Is this new code inside my application or is it a separate application?

3) To be clear, once I have kerberos installed and configured, I use JAAS and Java GSS-API for a java application?  What if my application is not written in java, lets say it is written in Fortran on OpenVMS?  I know Kerberos is available on OpenVMS.

Thank you for your input.
0
Comment
Question by:OliviaRedhorse
  • 2
3 Comments
 

Author Comment

by:OliviaRedhorse
ID: 33676727
Just answer this answer for me.
At what point do I invoke my java web application to begin? For examples sake, lets say I have java web applications (app1 and app2) and the user would like to get to app1.  I am trying to understand where the Kerberos ends and my application begins.  Thank you!
0
 
LVL 5

Accepted Solution

by:
dcesari earned 500 total points
ID: 33680553
Answer to point 3)

If your application is written in Fortran and not in Java, then the only way to use Kerberos is to find a C API for Kerberos, Fortran can call C code in a more or less standard way, at lest if you have a fairly recent compiler, but not java code.

So for this purpose you need to find a C example of Kerberos web application (I do not know Kerberos, so I cannot help much) and mimic its behavior from Fortran.


0
 

Author Closing Comment

by:OliviaRedhorse
ID: 33793499
Thank you for replying.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Java 1603 Error 2 42
bunnyEars2 challenge 6 67
firstChar challenge 13 83
solarwind tftp server 2 30
Java had always been an easily readable and understandable language.  Some relatively recent changes in the language seem to be changing this pretty fast, and anyone that had not seen any Java code for the last 5 years will possibly have issues unde…
Introduction This article is the first of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article explains our test automation goals. Then rationale is given for the tools we use to a…
Viewers learn about the scanner class in this video and are introduced to receiving user input for their programs. Additionally, objects, conditional statements, and loops are used to help reinforce the concepts. Introduce Scanner class: Importing…
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now