Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
134 DCE Replacement Strategies
maj_stat = gss_unseal(
&min_stat,
security_context,
&token,
&message,
NULL,
NULL);
8.2.3 Application server
At startup, the application server in this example registers its identity with the
DCE run-time environment. Then it acquires the credentials for the registered
identity, which it subsequently uses to accept the security context initiated by the
client. After mutual authentication is achieved successfully, the actual exchange
of application messages between the application server and the application client
can take place.
In this example, the application client sends a line of text to the server, which the
server ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book