Coda Authentication and Protection
1.1 Vice Configuration Files and authentication
Authentication and secure connections.
2.2 Secure and authenticated connections
2.3 Authentication tokens
2.4 Bugs to fix and things to improve
Authentication to the fileserver
3.1 Authenticated connections in Venus and Vice
3.2 Kerberos for Coda
3.3 Security holes to plug
4.1 Checking permissions.
4.2 The authorization library.
4.3 A few of the AL_ routines
4.4 Problematic aspects the ACL and PDB implementation.
Protection of files in Venus and the Coda filesystem on clients