Next
Previous Contents
Coda Authentication and Protection
Peter Braam
1.
Coda Security
1.1 Vice Configuration Files and authentication
2.
Authentication and secure connections.
2.1 Encryption
2.2 Secure and authenticated connections
2.3 Authentication tokens
2.4 Bugs to fix and things to improve
3.
Authentication to the fileserver
3.1 Authenticated connections in Venus and Vice
3.2 Kerberos for Coda
3.3 Security holes to plug
4.
Coda Protection
4.1 Checking permissions.
4.2 The authorization library.
4.3 A few of the AL_ routines
4.4 Problematic aspects the ACL and PDB implementation.
5.
Protection of files in Venus and the Coda filesystem on clients
Next
Previous Contents