Home
last modified time | relevance | path

Searched full:authorization (Results 1 – 25 of 1185) sorted by relevance

12345678910>>...48

/freebsd/crypto/krb5/src/clients/ksu/
H A Dt_ksu.py129 mark('no authorization')
132 expected_msg='authorization of alice@KRBTEST.COM failed')
134 mark('an2ln authorization')
137 expected_msg='authorization for ksutest@KRBTEST.COM successful')
139 expected_msg='account ksutest: authorization failed')
144 expected_msg='account ksutest: authorization failed')
150 expected_msg='account ksutest: authorization failed')
153 mark('.k5login authorization')
157 expected_msg='authorization for alice@KRBTEST.COM successful')
159 expected_msg='authorization for alice@KRBTEST.COM for execution of')
[all …]
H A Dmain.c411 fprintf(stderr, _("account %s: authorization failed\n"), target_user); in main()
415 "Account %s: authorization for %s for execution of %s failed", in main()
418 syslog(LOG_WARNING, "Account %s: authorization of %s failed", in main()
429 * After proper authentication and authorization, populate a cache for the in main()
436 * user to handle authorization and creating the target user's cache. in main()
526 /* Run authorization as target.*/ in main()
529 "authorization check")); in main()
535 com_err(prog_name,retval, _("while checking authorization")); in main()
542 "after authorization check")); in main()
548 print_status(_("Account %s: authorization for %s for " in main()
[all …]
H A DMakefile.in10 $(srcdir)/authorization.c \
18 authorization.o \
/freebsd/lib/libtacplus/
H A Dlibtacplus.385 authorization, and accounting by means of network requests to remote
88 and authorization portion of the protocol.
184 .Sh CREATING A TACACS+ AUTHORIZATION REQUEST
185 To begin constructing a new authorization request, call
230 only applies to the context of an authorization request.
341 .Sh SENDING THE AUTHORIZATION REQUEST AND RECEIVING THE RESPONSE
342 After the TACACS+ authorization request has been constructed, it
373 After the TACACS+ authorization request has been constructed, it
394 .Sh EXTRACTING INFORMATION FROM THE SERVER'S AUTHORIZATION RESPONSE
395 Like an authentication response packet, an authorization
[all …]
H A Dtaclib.h90 /* Authorization authenticatication methods */
101 /* Authorization status */
/freebsd/crypto/krb5/src/man/
H A Dksu.man71 authentication and authorization. Resolving the target principal name
79 target user is the source user, no authentication or authorization
94 .SH AUTHORIZATION
96 This section describes authorization of the source user when ksu is
102 user\(aqs home directory, ksu attempts to access two authorization files:
131 rules. Otherwise, authorization fails.
134 Upon successful authentication and authorization, ksu proceeds in a
186 and authorization phases of ksu.
338 The authorization algorithm for \fB\-e\fP is as follows:
341 authorization takes place and the command is executed. If source
[all …]
/freebsd/tools/regression/security/proc_to_proc/
H A DREADME2 Inter-Process Authorization Test Suite
6 authorization policy present in the kernel. It analyzes a series of
49 do point to possible changes that could be made in the authorization system
/freebsd/crypto/krb5/src/kadmin/server/
H A Dauth.h2 /* kadmin/server/auth.h - kadmin authorization declarations */
57 /* Initialize all authorization modules. */
60 /* Release authorization module state. */
/freebsd/contrib/pam-krb5/module/
H A Daccount.c2 * Implements the PAM authorization function (pam_acct_mgmt).
5 * user's authorization against .k5login (or whatever equivalent we've been
33 * Check the authorization of the user. It's not entirely clear what this
H A Dsupport.c58 * Verify the user authorization. Call krb5_kuserok if this is a local
87 * authorization methods. in pamk5_authorized()
/freebsd/crypto/openssh/regress/
H A Dssh-com.sh43 AuthorizationFile authorization
64 cp /dev/null ${OBJ}/${USER}/authorization
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
/freebsd/contrib/wpa/src/radius/
H A Dradius_das.h2 * RADIUS Dynamic Authorization Server (DAS)
40 /* Authorization changes */
/freebsd/crypto/heimdal/lib/krb5/
H A Dticket.c203 N_("Authorization data nested deeper " in find_type_in_ad()
211 * to run over the whole authorization data fields to check if in find_type_in_ad()
303 N_("Authorization data contains " in find_type_in_ad()
312 N_("Authorization data contains " in find_type_in_ad()
329 * Extract the authorization data type of type from the ticket. Store
356 N_("Ticket have not authorization data", "")); in krb5_ticket_get_authorization_data_type()
367 "authorization data of type %d", ""), in krb5_ticket_get_authorization_data_type()
/freebsd/crypto/heimdal/doc/
H A Dmisc.texi22 aaa authorization exec krb5-instance
35 able to login at all. The `instance map' and `authorization exec' lines
/freebsd/lib/libcompat/4.3/
H A Drexec.399 information returned does not include remote authorization failure,
100 as the secondary connection is set up after authorization has been
/freebsd/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.869 for authentication and authorization will be the
79 Authorization is performed
/freebsd/lib/libfetch/
H A Dfetch.3590 Specifies HTTP authorization parameters as a colon-separated list of
592 The first and second item are the authorization scheme and realm
598 authorization methods are supported.
603 This variable is only used if the server requires authorization and
619 Specifies authorization parameters for the HTTP proxy in the same
/freebsd/contrib/pam-krb5/docs/
H A Ddocknot.yaml98 supports ticket refreshing by screen savers, configurable authorization
109 ticket cache handling, simple authorization (via .k5login or checking
120 the Sourceforge module does not (particularly around authorization), and
296 authorization is only meaningful for local accounts and ticket caches
414 in `/etc/krb5.conf`. `pam_authenticate` also does a basic authorization
431 authenticated principal, and then does is another authorization check
/freebsd/sys/fs/fuse/
H A Dfuse_file.h102 * authorization (except when mounted with -o default_permissions). In order
112 * doing server-side authorization.
177 * authorization.
/freebsd/share/man/man9/
H A Ducred.9197 process credential be designed to avoid other authorization functions.
209 Caution should be exercised when checking authorization for a thread or
/freebsd/contrib/dialog/package/debian/
H A Dcopyright53 authorization.
77 ings in this Software without prior written authorization from the X Consor-
/freebsd/contrib/pam-krb5/
H A DREADME.md19 supports ticket refreshing by screen savers, configurable authorization
31 ticket cache handling, simple authorization (via .k5login or checking
42 the Sourceforge module does not (particularly around authorization), and
323 authorization is only meaningful for local accounts and ticket caches are
442 `/etc/krb5.conf`. `pam_authenticate` also does a basic authorization
459 authenticated principal, and then does is another authorization check
H A DREADME16 authorization handling, authentication of non-local accounts for network
27 user ticket cache handling, simple authorization (via .k5login or
40 authorization), and does not support some options (particularly ones not
298 authorization is only meaningful for local accounts and ticket caches
411 /etc/krb5.conf. pam_authenticate also does a basic authorization check,
428 authenticated principal, and then does is another authorization check
/freebsd/crypto/krb5/src/lib/gssapi/mechglue/
H A Dg_authorize_localname.c76 * Naming extensions based local login authorization.
128 * Equality based local login authorization.
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dmk_req_ext.c260 krb5_authdata **authorization, in generate_authenticator() argument
289 if (authorization != NULL || ext_authdata != NULL) { in generate_authenticator()
291 authorization, in generate_authenticator()

12345678910>>...48