(Illustration by Gaich Muramatsu)
On Tue, Jun 05, 2001 at 04:54:34PM +0200, Ivan Popov wrote: > Hello Jan! > > You wrote: > > > It is possible to authenticate using kerberos, and then use the > > authenticator to obtain a Coda token. I'm not sure how to completely > > automate that. > > Please consider the pam_kcoda hack that I have sent to codadev (I suppose > it could nicely fit on coda ftp area?). I already looked at it yesterday. Too bad my desktop isn't kerberized, so I couldn't give it a try. If you look at ftp.coda.cs.cmu.edu now... /pub/coda/contrib/, I collected all the various pam_coda modules that I know of and could get my hands on. > sometimes return unexpected codes? or libpam bug? and that if your kclog > doesn't exist or can not find shared libraries, you get no tokens and may > be even logged out. Would using the 'optional' instead of the 'sufficient' qualifier in the pam configuration file solve that problem? JanReceived on 2001-06-05 11:59:24