Return-Path: Delivered-To: apmail-directory-dev-archive@www.apache.org Received: (qmail 81230 invoked from network); 16 Jun 2005 13:01:11 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 16 Jun 2005 13:01:11 -0000 Received: (qmail 68612 invoked by uid 500); 16 Jun 2005 13:01:10 -0000 Delivered-To: apmail-directory-dev-archive@directory.apache.org Received: (qmail 68554 invoked by uid 500); 16 Jun 2005 13:01:09 -0000 Mailing-List: contact dev-help@directory.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list dev@directory.apache.org Received: (qmail 68541 invoked by uid 99); 16 Jun 2005 13:01:09 -0000 X-ASF-Spam-Status: No, hits=0.2 required=10.0 tests=NO_REAL_NAME X-Spam-Check-By: apache.org Received-SPF: pass (hermes.apache.org: local policy) Received: from mail2.lhsystems.com (HELO mail2.lhsystems.com) (193.24.33.73) by apache.org (qpsmtpd/0.28) with ESMTP; Thu, 16 Jun 2005 06:01:09 -0700 Received: from xw2k3-fracon-03.ads.dlh.de (xnt-fracon [57.20.111.192]) by mail2.lhsystems.com (Postfix) with ESMTP id 558A7807C5B for ; Thu, 16 Jun 2005 10:07:19 +0200 (CEST) Received: from XW2K3-FRAMBX-01.ads.dlh.de ([57.20.111.183]) by xw2k3-fracon-03.ads.dlh.de with Microsoft SMTPSVC(6.0.3790.1830); Thu, 16 Jun 2005 10:07:19 +0200 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: AW: WG: [server] writing my own authenticator Date: Thu, 16 Jun 2005 10:07:18 +0200 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: WG: [server] writing my own authenticator Thread-Index: AcVyEjFfRW0qNq6KR3SWuEWCFCUMVAAMXLCA From: To: X-OriginalArrivalTime: 16 Jun 2005 08:07:19.0462 (UTC) FILETIME=[6AC8D460:01C5724A] X-Virus-Checked: Checked X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N Hi, What I'm trying to implemnt, is too get several attributes only passed = to known hosts. At the next step, I'd like to pass some attributes only = to the client if he uses a secure connection. So I could use the clients hostname or IP and if he is using a secure = protocol like SSL or not. I've learned, that the in big companies logins and passwords to systems = spread like fire (i.e. when programmers begin another project), but in a = well secured network it is not quite as easy to use the IP of another = server. Or at least, when i have an IP I cant track down, who accesses = my systems. IMHO to these reasons a principal and credentials is not enough too = authenticate somebody. >So we're good if the protocol provider stuff's this extra information=20 >into the environment of the context. We can make the changes but how=20 >should we manage the keys? >What do you want in there? Would you like to make the changes yourself = >and see if it works? I think in BindRequest ProtocolSession.getTransportType() and = ProtocolSession.getRemoteAdress should be stored in the context. When = you have no time to do this, perhaps I could do this tomorrow from home, = because my svn plugin cannot use a proxy. But to be honest, I'd never = checked some source in or changed one of your projects, so I'm a little = nervous about that. ;-) Greetings Christian