Skip Menu |

Download (untitled) / with headers
text/plain 1.7KiB
From Wed Oct 15 14:54:48 1997
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU []) by rt-11.MIT.EDU (8.7.5/8.7.3) with SMTP id OAA28132 for <bugs@RT-11.MIT.EDU>; Wed, 15 Oct 1997 14:54:47 -0400
Received: from by MIT.EDU with SMTP
id AA24581; Wed, 15 Oct 97 14:54:42 EDT
Received: (from benjid@localhost)
by (8.8.6/8.8.6) id NAA24604;
Wed, 15 Oct 1997 13:54:43 -0500 (CDT)
Message-Id: <>
Date: Wed, 15 Oct 1997 13:54:43 -0500 (CDT)
To: krb5-bugs@MIT.EDU
Subject: krb5-misc
X-Send-Pr-Version: 3.99

Show quoted text
>Number: 480
>Category: krb5-clients
>Synopsis: how to enable kerberos authentication with XDM
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: krb5-unassigned
>State: open
>Class: support
>Submitter-Id: unknown
>Arrival-Date: Wed Oct 15 14:55:00 EDT 1997
>Originator: Ben Dehner
Team Technologies
Cedar Falls, IA
Show quoted text
>Release: 1.0pl1

System: IRIX media 6.2 03131015 IP22
network of IRIX systems

Show quoted text
I have set up and installed Kerberos V at our site; all clients
and servers work as expected. However, many people use X-clients
(X terminals or X software on a PC) to log in to servers, which
bypasses Kerberos authentication. Is there a way to force the
X display manager (xdm) to use Kerberos authentication instead of
normal Unix password file authentication?

I have tried replacing the "login" program with the Kerberos
login.krb5, but apparently the xdm uses its own internal
authentication instead of going through "login".

Show quoted text

Show quoted text

Show quoted text
Subject: how to enable kerberos authentication with XDM
Old query, and we don't do xdm. Xdm folks may have some sort of plugin
architecture like PAM that could be used, but I don't have any info on