active directory
This commit is contained in:
parent
ec201342f8
commit
abd8a2c459
37
AD convo.md
Normal file
37
AD convo.md
Normal file
@ -0,0 +1,37 @@
|
||||
[mailing_list](https://www.postgresql.org/message-id/flat/CAHq%2BKHJOvZT8M-o_sE%2BQzqqBGnUjNubWo_rRmpHZyw5ZUuaseg%40mail.gmail.com)
|
||||
|
||||
|
||||
wouldn't that be Pg authing against the OS (pam) which in turn is forwarding to krb5? which seems like an extra added step
|
||||
|
||||
sfrost [11:11 AM]
|
||||
it's basically this:
|
||||
ktpass -out postgres.keytab -princ
|
||||
POSTGRES/centos(at)MY(dot)TESTDOMAIN(dot)LAN -mapUser enterprisedb -pass XXXXXX
|
||||
-crypto DES-CBC-MD5
|
||||
(except adjusted a bit to make it not use a shitty crypto)
|
||||
you use ktpass to create your keytab file
|
||||
copy the keytab file to the Linux box
|
||||
|
||||
arossouw [11:12 AM]
|
||||
Seems like effort, i'll just play dumb on that one
|
||||
|
||||
sfrost [11:12 AM]
|
||||
oh, gotta fix the princ too or whatever
|
||||
but it's not that hard
|
||||
and you might have to configure the realms, but not necessairly (that info is often in DNS already)
|
||||
then you just tell PG where the keytab file is, set gssapi in PG's hba.conf, and create your users using their princ names, like 'sfrost@SNOWMAN.NET'
|
||||
|
||||
dtseiler [11:13 AM]
|
||||
I’m with @hunleyd, I’d love to see a great howto post on that.
|
||||
|
||||
arossouw [11:14 AM]
|
||||
I suppose the question is what is the advantage of using kerberos, and then deciding if its worth spending time on
|
||||
|
||||
sfrost [11:14 AM]
|
||||
I just wrote it
|
||||
^^^ see above
|
||||
also wrote the advantage...
|
||||
|
||||
|
||||
hunleyd [11:14 AM]
|
||||
maybe i'll try this as a 10% project some day
|
Loading…
Reference in New Issue
Block a user