
INSTALLATION INSTRUCTIONS

1. TESTING THE SAMPLE AUTHENTICATOR (vmsauth)

Unpack the distribution and take a look into the file b_order.h. If your system
is LITTLE_ENDIAN (Intel/Linux), you don't need to touch anything. Otherwise,
you might want to change this to BIG_ENDIAN.

Next, take a look into the file vmsauth.c. Change the value of the macro
PASSWDFILE to the exact directory and location of the passwd.vms file (for
testing purposes, this may be left untouched, if vmsauth is executed from
the same directory where passwd.vms resides).

Now type "make" to build the package.

If everything gets well, type ./vmsauth and enter the following data:

Username: demo
Password: sample

The file should respond "OK". If you don't get "OK", you probably made a
mistake about byte order on your system - try to switch big/little endian
definitions in b_order.h and type "make clean; make" to rebuild the package.
If you still have problems, add "-DDEBUG=1" in CFLAGS in Makefile, rebuild
the package and compare the result with the contents of passwd.vms.


2. PUTTING THE AUTHENTICATOR IN WORK

Once you tested the authenticator and everything works fine, change whatever
it takes in the authenticator code (and/or other programs which need to use
the VMScrypt() function - e.g. login, tacacs and radius servers, Web and
proxy user authenticators etc.).

Next, convert the OpenVMS user database (UAF) into passwd format. That step
must be performed from the SYSTEM (or other suitably privileged) account
on the OpenVMS system. You may want to use either of the programs from
the vms subdirectory - uaf2pwd1.for or uaf2pwd2.for. For users which lack of
a fortran compiler - executables that work on VMS 5.4 and are provided as
well. The former program (uaf2pwd1) is written in a more clean and proper
fashion, but it is extremely slower than the latter one (uaf2pwd2), which
makes use of dirty sequential access to the UAF. Both programs generate
the Unix-passwd-compliant file passwd.vms, which should be transferred to
the Unix system afterwards.

Good luck! ;-)


