Re: Ldap config for Active Directory
| От | Sylvain Deveaux |
|---|---|
| Тема | Re: Ldap config for Active Directory |
| Дата | |
| Msg-id | 7f75b5d2f3c58b8d42c1012c784555d05f5f2124.camel@niwa.co.nz обсуждение исходный текст |
| Ответ на | Re: Ldap config for Active Directory (Stephen Frost <sfrost@snowman.net>) |
| Ответы |
Re: Ldap config for Active Directory
|
| Список | pgsql-admin |
Why do you say that you can't use kerberos w/ apps?
I prefer to not reply to this one otherwise I won't be kind with some people... 😅️
Note that using ldap auth means sending the user's password to the PGserver in cleartext, which is extremely insecure and means that acompromised PG server could be used to steal the credentials of any userlogging in using this method.
I agree... but for now I can't switch a to full Kerberos setup...
On Thu, 2022-09-15 at 15:16 -0400, Stephen Frost wrote:
Greetings,* Sylvain Deveaux (Sylvain.Deveaux@niwa.co.nz) wrote:We have to use LDAP in our AD environment, Users could use Kerberos but service accounts used by Apps can't.Why do you say that you can't use kerberos w/ apps?host all +ldap_roles 192.168.0.0/16 ldap ldapurl="ldap://ldap.service:636/ou=AdminOU,dc=domain,dc=org?sAMAccountName?sub" ldapbinddn="cn=postgres_bind,ou=level1,ou=level2,dc=domain,dc=org" ldapbindpasswd="password"Note that using ldap auth means sending the user's password to the PGserver in cleartext, which is extremely insecure and means that acompromised PG server could be used to steal the credentials of any userlogging in using this method.Thanks,Stephen
|
В списке pgsql-admin по дате отправления: