[Date Prev][Date Next] [Chronological] [Thread] [Top]

proxy authentication



another approach would be to have an extended operation
which would an application server could use to proxy the
SASL exchanges.  That is, an exop whose request data
was the SASL request data provided to application server
(from the application client) and whose response data
was the SASL response data to be provided to the
application client.  The exop could also carry, on
the last exchange response, the authentication and
authorization identity established.

Kurt