if your goal is encryption.. i found this explanation from Stanford helpful in understanding kerberos/ssh/ssl
http://pangea.stanford.edu/computerinfo/resources/network/security/safeguards/kerberos.html HTH Martin ______________________________________________ Disclaimer and Confidentiality/Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité This message is confidential. If you should not be the intended receiver, then we ask politely to report. Each unauthorized forwarding or manufacturing of a copy is inadmissible. This message serves only for the exchange of information and has no legal binding effect. Due to the easy manipulation of emails we cannot take responsibility over the the contents. Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung fuer den Inhalt uebernehmen. Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le destinataire prévu, nous te demandons avec bonté que pour satisfaire informez l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est interdite. Ce message sert à l'information seulement et n'aura pas n'importe quel effet légalement obligatoire. Étant donné que les email peuvent facilement être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité pour le contenu fourni. > Date: Mon, 11 May 2009 18:37:22 -0400 > From: ch...@christopherschultz.net > To: users@tomcat.apache.org > Subject: Re: Form-based Container Security with SSL > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Guojun, > > On 5/11/2009 5:49 PM, Guojun Zhu wrote: > > Dear Chris, > > > > Thank you very much. What we really want is that the login > > username/password communicates encrypted. Everything else can be in > > clear-text. (We also need the log-out, so I cannot use the digest > > authentification.) > > > > > >> Showing a non-secure login page isn't a problem, is it? You just need to > >> make sure that the login form's action is HTTPS and you will get a > >> secure login. > > > > But if this login page is reached by http, will the login > > username/password be sent out in clear-texted? > > The scheme used to access the login page is not relevant to the safety > of your credentials. Only the scheme used to /submit/ those credentials > from your login form is relevant. > > > Or should I specified the action "j_security_check" as https? > > Definitely. > > > Then after the authentication, > > change back to http. > > Correct. > > > (By changing the secured cookie into unsecured? > > Where? In every pages as tomcat has redirect the link away from > > login?) > > No, all my suggestions have been to create a non-secure session id > cookie /before/ authentication occurs. Then you don't have to worry > about it, later. > > - -chris > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (MingW32) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iEYEARECAAYFAkoIqKIACgkQ9CaO5/Lv0PAifgCdGOhDbM2bEmMyoZUGCKrwSQx5 > Sg0AoJCaYuusBHIS98n8vKRUtalnjQkD > =OlR2 > -----END PGP SIGNATURE----- > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > _________________________________________________________________ Windows Live™: Keep your life in sync. http://windowslive.com/explore?ocid=TXT_TAGLM_BR_life_in_synch_052009