Help on Session Manager and FileView
←Previous Next→ Contents Close Help
  Token-Based Access Control

  Token-based access control        authorizes access to the X
  server based on the presentation of a valid password (or
  token  ) by a client application during a connection request.
  The level to which the client is authenticated and the method
  of authentication varies depending on the procotol in use,
  which is specified in a user's X authority file  .

  In general, each time a client application attempts to connect
  to an X server protected with token-based access control, the
  server references the current X authority file to determine
  the appropriate protocol to apply and authentication method
  to follow in order to grant the connection.

  The token-based access control protocols supported by
  DECwindows are MIT-MAGIC-COOKIE-1 (Magic Cookie)
  and MIT-KERBEROS-5 (Kerberos).

  Magic Cookie
  Magic Cookie authorizes connections to an X server based on
  entries in the X authority file.  Each entry for Magic Cookie
  access control specifies:

  *   the name of the X display ([transport/][host][:]:server[.screen])

  *   the protocol name (MIT-MAGIC-COOKIE-1)

  *   a random, 128-bit numeric code known as a        magic
      cookie

  Once Magic Cookie access control is enabled on the server,
  a new X authority file entry is generated automatically
  each time you successfully log into your local desktop.
  The magic cookie authorizing the local connection, along
  with the device, transport, and protocol name is passed
  to the X server and stored in your X authority file
  (SYS$LOGIN:DECW$XAUTHORITY.DECW$XAUTH).
  By default, cookies generated by the Session Manager do not
  have a set timeout period and are granted trusted network
  privileges.  If a cookie is believed to have been compromised,
  you can choose to generate a new cookie.

  Each time a client application attempts to connect to the
  X server during your session, the application must present a
  valid cookie to the X server along with the connection request.

  If the cookie matches the one currently maintained by the X
  server, the connection is authorized, access is granted to
  the X server, and the display is opened.  If the client does
  not present a valid cookie, a message is displayed, and the
  connection is denied.

  Due to the use of a randomly-generated token, Magic Cookie
  provides a more secure form of access control than the user-
  based scheme.  However, since the the cookies themselves
  are sent across the network unencrypted, they can be prone
  to interception.  As a result, this form of access control is
  recommended for authorizing connections in a local area
  network (LAN) or limited DECnet environment.

  Kerberos

  Kerberos authorizes connections to an X server based on a
  combination of the following:

  *   the protocol name (MIT-KERBEROS-5) in the X
      authority file

  *   a list of valid Kerberos principals and their associated
      passwords

  *   presentation of valid credentials

  Kerberos credentials, or  tickets , are a set of electronic
  information that can be used to verify the identity of a
  principal  .  These principals are stored in an Authorized

  Principals list kept on the server system.  With Kerberos,
  client applications run by a valid principal send requests for a
  ticket from the Kerberos   Key Distribution Center (KDC)
  each time they attempt to connect to the Kerberos-protected

  X server.

  Once Kerberos access control is enabled on the server, a new
  ticket is requested from the KDC automatically each time
  you log into your local desktop.  The KDC creates a ticket-
  granting ticket (TGT) associated with your principal name,
  encrypts it using your password as the key, and returns the
  encrypted TGT.

  If the TGT is decrypted successfully, you are authenticated
  and the TGT is cached.  The TGT permits you, as the
  authenticated principal, to obtain additional tickets.  These
  additional tickets grant access to specific services, in this case,
  access to the X server from other client applications.  The
  requesting and granting of these additional tickets happens
  transparently.

  By default, each TGT expires at a specified time.  If a TGT
  has expired, you can generate a new TGT by disabling and
  reeanbling Kerberos (which forces a Kerberos login).  If
  you believe a ticket has been compromised, you can choose
  to disable Kerberos and revoke the current ticket, which
  effectively flushes the client credentials cache.

  Kerberos is the most secure form of access control since
  it encrypts the initial authentication information between
  the requesting client and the server system.  Therefore, it
  is the recommended method for authorizing remote client
  connections over unsecure networks, such as the Internet.

  For information on how to configure the access control
  settings for the local X display server or DECwindows Motif
  client applications, double click on an item from the list of
  additional topics below.

  Additional topics:

  *   User-Based Access Control

  *   Configuring X Server Access Control

  *   Configuring Client Access Control
←Previous Next→ Contents Close Help