Codebase list cyrus-sasl2 / debian/2.1.24_rc1.dfsg1-1 man / sasl_authorize_t.3
debian/2.1.24_rc1.dfsg1-1

Tree @debian/2.1.24_rc1.dfsg1-1 (Download .tar.gz)

sasl_authorize_t.3 @debian/2.1.24_rc1.dfsg1-1raw · history · blame

.\" -*- nroff -*-
.\" 
.\" Copyright (c) 2001 Carnegie Mellon University.  All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\"
.\" 1. Redistributions of source code must retain the above copyright
.\"    notice, this list of conditions and the following disclaimer. 
.\"
.\" 2. Redistributions in binary form must reproduce the above copyright
.\"    notice, this list of conditions and the following disclaimer in
.\"    the documentation and/or other materials provided with the
.\"    distribution.
.\"
.\" 3. The name "Carnegie Mellon University" must not be used to
.\"    endorse or promote products derived from this software without
.\"    prior written permission. For permission or any other legal
.\"    details, please contact  
.\"      Office of Technology Transfer
.\"      Carnegie Mellon University
.\"      5000 Forbes Avenue
.\"      Pittsburgh, PA  15213-3890
.\"      (412) 268-4387, fax: (412) 268-7395
.\"      tech-transfer@andrew.cmu.edu
.\"
.\" 4. Redistributions of any form whatsoever must retain the following
.\"    acknowledgment:
.\"    "This product includes software developed by Computing Services
.\"     at Carnegie Mellon University (http://www.cmu.edu/computing/)."
.\"
.\" CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
.\" THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
.\" AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
.\" FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
.\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
.\" OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" 
.TH sasl_authorize_t 3 "10 July 2001" SASL "SASL man pages"
.SH NAME
sasl_authorize_t \- The SASL authorization callback


.SH SYNOPSIS
.nf
.B #include <sasl/sasl.h>

.sp
.BI "int sasl_authorize_t(void " *context ", "
.BI "		          const char " *requested_user ", unsigned " alen ","
.BI "		          const char " *auth_identity ", unsigned " alen ","
.BI "		          const char " *def_realm ", unsigned " urlen ","
.BI "		          struct propctx " *propctx ") "

.fi
.SH DESCRIPTION

.B sasl_authorize_t
is used to check whether the authorized user
.I auth_identity
may act as the user
.I requested_user.
For example the user root may wish to authenticate with his
credentials but act as the user tmartin (with all of tmartin's rights
not roots). A server application should be very careful, and probably
err on the side of caution, when determining which users may proxy as
whom.
.PP

.SH "RETURN VALUE"
SASL callback functions should return SASL return codes. See sasl.h for a complete list. SASL_OK indicates success.

.SH "SEE ALSO"
sasl(3), sasl_callbacks(3)