Re: [HACKERS] USER Profiles for PostgreSQL

From: Stephen Frost <sfrost(at)snowman(dot)net>
To: John R Pierce <pierce(at)hogranch(dot)com>
Cc: pgsql-general(at)postgresql(dot)org
Subject: Re: [HACKERS] USER Profiles for PostgreSQL
Date: 2017-09-20 16:10:19
Message-ID: 20170920161019.GF4628@tamriel.snowman.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

Greetings John,

* John R Pierce (pierce(at)hogranch(dot)com) wrote:
> On 9/20/2017 6:55 AM, Stephen Frost wrote:
> >If AD is in the mix here, then there's no need to have things happening
> >at the database level when it comes to passwords- configure PG to use
> >Kerberos and create a princ in AD and put that on the database server
> >and then users can authenticate that way.
>
> for web apps?   how does a web browser do kerberos over http ?

Yes, and using SPNEGO, which the major browsers have all supported for a
very long time.

Thanks!

Stephen

In response to

Browse pgsql-general by date

  From Date Subject
Next Message George Neuner 2017-09-20 17:19:10 Re: VM-Ware Backup of VM safe?
Previous Message John R Pierce 2017-09-20 16:03:55 Re: [HACKERS] USER Profiles for PostgreSQL

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2017-09-20 16:18:23 Re: pgsql: Add basic TAP test setup for pg_upgrade
Previous Message Masahiko Sawada 2017-09-20 16:07:13 Assertion failure when the non-exclusive pg_stop_backup aborted.