Dear Stephen, You're absolutely right, the mapping work very well.
I've created 2 "service user" on Active Directory (postgres and postgres_dev), and generated the keytab like this:
ktpass -out postgres_pg1.keytab -princ postgres/PGDOMT1.ad.com@xxxxxx -mapUser AD\postgres -pass 'UserPass1' -mapOp add -crypto ALL -ptype KRB5_NT_PRINCIPAL
ktpass -out postgres_pg2.keytab -princ postgres/PGDOMT2.ad.com@AD.COM
-mapUser AD\postgres_dev -pass 'UserPass2' -mapOp add -crypto ALL -ptype KRB5_NT_PRINCIPAL De : Stephen Frost <sfrost@xxxxxxxxxxx>
Envoyé : 29 avril 2019 13:35 À : Jean-Philippe Chenel Cc : pgsql-general@xxxxxxxxxxxxxxxxxxxx Objet : Re: 9.6.9 Default configuration for a default installation but different with-krb-srvnam Greetings,
* Jean-Philippe Chenel (jp.chenel@xxxxxxx) wrote: > If I understand, the mapping can be done in the pg_ident.conf file ? No, you do the mapping in AD. Look at the '/princ' and '/mapuser' options used in the ktpass command here: https://info.crunchydata.com/blog/windows-active-directory-postgresql-gssapi-kerberos-authentication
Thanks, Stephen |