| /freebsd/crypto/krb5/src/clients/ksu/ |
| H A D | t_ksu.py | 129 mark('no authorization') 132 expected_msg='authorization of alice@KRBTEST.COM failed') 134 mark('an2ln authorization') 137 expected_msg='authorization for ksutest@KRBTEST.COM successful') 139 expected_msg='account ksutest: authorization failed') 144 expected_msg='account ksutest: authorization failed') 150 expected_msg='account ksutest: authorization failed') 153 mark('.k5login authorization') 157 expected_msg='authorization for alice@KRBTEST.COM successful') 159 expected_msg='authorization for alice@KRBTEST.COM for execution of') [all …]
|
| H A D | main.c | 411 fprintf(stderr, _("account %s: authorization failed\n"), target_user); in main() 415 "Account %s: authorization for %s for execution of %s failed", in main() 418 syslog(LOG_WARNING, "Account %s: authorization of %s failed", in main() 429 * After proper authentication and authorization, populate a cache for the in main() 436 * user to handle authorization and creating the target user's cache. in main() 526 /* Run authorization as target.*/ in main() 529 "authorization check")); in main() 535 com_err(prog_name,retval, _("while checking authorization")); in main() 542 "after authorization check")); in main() 548 print_status(_("Account %s: authorization for %s for " in main() [all …]
|
| H A D | Makefile.in | 10 $(srcdir)/authorization.c \ 18 authorization.o \
|
| /freebsd/lib/libtacplus/ |
| H A D | libtacplus.3 | 85 authorization, and accounting by means of network requests to remote 88 and authorization portion of the protocol. 184 .Sh CREATING A TACACS+ AUTHORIZATION REQUEST 185 To begin constructing a new authorization request, call 230 only applies to the context of an authorization request. 341 .Sh SENDING THE AUTHORIZATION REQUEST AND RECEIVING THE RESPONSE 342 After the TACACS+ authorization request has been constructed, it 373 After the TACACS+ authorization request has been constructed, it 394 .Sh EXTRACTING INFORMATION FROM THE SERVER'S AUTHORIZATION RESPONSE 395 Like an authentication response packet, an authorization [all …]
|
| H A D | taclib.h | 90 /* Authorization authenticatication methods */ 101 /* Authorization status */
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | ksu.man | 71 authentication and authorization. Resolving the target principal name 79 target user is the source user, no authentication or authorization 94 .SH AUTHORIZATION 96 This section describes authorization of the source user when ksu is 102 user\(aqs home directory, ksu attempts to access two authorization files: 131 rules. Otherwise, authorization fails. 134 Upon successful authentication and authorization, ksu proceeds in a 186 and authorization phases of ksu. 338 The authorization algorithm for \fB\-e\fP is as follows: 341 authorization takes place and the command is executed. If source [all …]
|
| /freebsd/tools/regression/security/proc_to_proc/ |
| H A D | README | 2 Inter-Process Authorization Test Suite 6 authorization policy present in the kernel. It analyzes a series of 49 do point to possible changes that could be made in the authorization system
|
| /freebsd/crypto/krb5/src/kadmin/server/ |
| H A D | auth.h | 2 /* kadmin/server/auth.h - kadmin authorization declarations */ 57 /* Initialize all authorization modules. */ 60 /* Release authorization module state. */
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | account.c | 2 * Implements the PAM authorization function (pam_acct_mgmt). 5 * user's authorization against .k5login (or whatever equivalent we've been 33 * Check the authorization of the user. It's not entirely clear what this
|
| H A D | support.c | 58 * Verify the user authorization. Call krb5_kuserok if this is a local 87 * authorization methods. in pamk5_authorized()
|
| /freebsd/crypto/openssh/regress/ |
| H A D | ssh-com.sh | 43 AuthorizationFile authorization 64 cp /dev/null ${OBJ}/${USER}/authorization 67 echo Key $t.com >> ${OBJ}/${USER}/authorization
|
| /freebsd/contrib/wpa/src/radius/ |
| H A D | radius_das.h | 2 * RADIUS Dynamic Authorization Server (DAS) 40 /* Authorization changes */
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | ticket.c | 203 N_("Authorization data nested deeper " in find_type_in_ad() 211 * to run over the whole authorization data fields to check if in find_type_in_ad() 303 N_("Authorization data contains " in find_type_in_ad() 312 N_("Authorization data contains " in find_type_in_ad() 329 * Extract the authorization data type of type from the ticket. Store 356 N_("Ticket have not authorization data", "")); in krb5_ticket_get_authorization_data_type() 367 "authorization data of type %d", ""), in krb5_ticket_get_authorization_data_type()
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | misc.texi | 22 aaa authorization exec krb5-instance 35 able to login at all. The `instance map' and `authorization exec' lines
|
| /freebsd/lib/libcompat/4.3/ |
| H A D | rexec.3 | 99 information returned does not include remote authorization failure, 100 as the secondary connection is set up after authorization has been
|
| /freebsd/lib/libpam/modules/pam_ksu/ |
| H A D | pam_ksu.8 | 69 for authentication and authorization will be the 79 Authorization is performed
|
| /freebsd/lib/libfetch/ |
| H A D | fetch.3 | 590 Specifies HTTP authorization parameters as a colon-separated list of 592 The first and second item are the authorization scheme and realm 598 authorization methods are supported. 603 This variable is only used if the server requires authorization and 619 Specifies authorization parameters for the HTTP proxy in the same
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | docknot.yaml | 98 supports ticket refreshing by screen savers, configurable authorization 109 ticket cache handling, simple authorization (via .k5login or checking 120 the Sourceforge module does not (particularly around authorization), and 296 authorization is only meaningful for local accounts and ticket caches 414 in `/etc/krb5.conf`. `pam_authenticate` also does a basic authorization 431 authenticated principal, and then does is another authorization check
|
| /freebsd/sys/fs/fuse/ |
| H A D | fuse_file.h | 102 * authorization (except when mounted with -o default_permissions). In order 112 * doing server-side authorization. 177 * authorization.
|
| /freebsd/share/man/man9/ |
| H A D | ucred.9 | 197 process credential be designed to avoid other authorization functions. 209 Caution should be exercised when checking authorization for a thread or
|
| /freebsd/contrib/dialog/package/debian/ |
| H A D | copyright | 53 authorization. 77 ings in this Software without prior written authorization from the X Consor-
|
| /freebsd/contrib/pam-krb5/ |
| H A D | README.md | 19 supports ticket refreshing by screen savers, configurable authorization 31 ticket cache handling, simple authorization (via .k5login or checking 42 the Sourceforge module does not (particularly around authorization), and 323 authorization is only meaningful for local accounts and ticket caches are 442 `/etc/krb5.conf`. `pam_authenticate` also does a basic authorization 459 authenticated principal, and then does is another authorization check
|
| H A D | README | 16 authorization handling, authentication of non-local accounts for network 27 user ticket cache handling, simple authorization (via .k5login or 40 authorization), and does not support some options (particularly ones not 298 authorization is only meaningful for local accounts and ticket caches 411 /etc/krb5.conf. pam_authenticate also does a basic authorization check, 428 authenticated principal, and then does is another authorization check
|
| /freebsd/crypto/krb5/src/lib/gssapi/mechglue/ |
| H A D | g_authorize_localname.c | 76 * Naming extensions based local login authorization. 128 * Equality based local login authorization.
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | mk_req_ext.c | 260 krb5_authdata **authorization, in generate_authenticator() argument 289 if (authorization != NULL || ext_authdata != NULL) { in generate_authenticator() 291 authorization, in generate_authenticator()
|