Lines Matching full:authorization
71 authentication and authorization. Resolving the target principal name
79 target user is the source user, no authentication or authorization
94 .SH AUTHORIZATION
96 This section describes authorization of the source user when ksu is
102 user\(aqs home directory, ksu attempts to access two authorization files:
131 rules. Otherwise, authorization fails.
134 Upon successful authentication and authorization, ksu proceeds in a
186 and authorization phases of ksu.
338 The authorization algorithm for \fB\-e\fP is as follows:
341 authorization takes place and the command is executed. If source
343 authorization fails. Otherwise, \fB~target_user/.k5users\fP file