Browse Prior Art Database

Adding Transparent NFS/Distributed File Services Gateway Authentication for PC-NFS Clients

IP.com Disclosure Number: IPCOM000117681D
Original Publication Date: 1996-May-01
Included in the Prior Art Database: 2005-Mar-31
Document File: 2 page(s) / 40K

Publishing Venue

IBM

Related People

Burnett, RC: AUTHOR [+2]

Abstract

A method for adding transparent NFS/Distributed File Services (DFS) Gateway authentication for PC-NFS clients is disclosed. Authentication occurs when PC-NFS clients attempt to mount a remote filesystem from an NFS Server. This normal authentication process is extended to allow an NFS/DFS Gateway authentication mapping to also occur.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 81% of the total text.

Adding Transparent NFS/Distributed File Services Gateway Authentication
for PC-NFS Clients

      A method for adding transparent NFS/Distributed File Services
(DFS) Gateway authentication for PC-NFS clients is disclosed.
Authentication occurs when PC-NFS clients attempt to mount a remote
filesystem from an NFS Server.  This normal authentication process is
extended to allow an NFS/DFS Gateway authentication mapping to also
occur.

      To provide transparent authentication to Distributed Computing
Environment (DCE), the existing local system authentication is used
and extended.  The PC-NFS client requests authentication across the
network by sending across a user Identification (ID) and password.

      This information is given to a daemon running at the NFS
server.  The daemon verifies the remote user ID and password against
the the user IDs and passwords maintained at the server system for a
match.  A match of this information implies the client has permission
to do the requested action such as mount the server's exported file
system.

      The original NFS daemon code is extended so in addition to
verifying local authentication, a secondary authentication in the
form of an NFS/DFS Gateway authentication mapping may be performed.

      This is accomplished by verifying that the secondary
authentication is enabled (an NFS/DFS Gateway is running on the
server system).  Additional command arguments needed for the
secondary authentication are extr...