From: | Thomas Munro <thomas(dot)munro(at)enterprisedb(dot)com> |
---|---|
To: | Graham Leggett <minfrin(at)sharp(dot)fm> |
Cc: | Pg Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: DNS SRV support for LDAP authentication |
Date: | 2019-02-01 23:57:27 |
Message-ID: | CAEepm=0pvO95=Gzy9_kTkM=mmwu81Qi7QeXUyfbtwV3Ng74Kow@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Sat, Feb 2, 2019 at 9:25 AM Graham Leggett <minfrin(at)sharp(dot)fm> wrote:
> On 25 Sep 2018, at 04:09, Thomas Munro <thomas(dot)munro(at)enterprisedb(dot)com> wrote:
> > Some people like to use DNS SRV records to advertise LDAP servers on
> > their network. Microsoft Active Directory is usually (always?) set up
> > that way. Here is a patch to allow our LDAP auth module to support
> > that kind of discovery.
>
> Does this support SSL/TLS?
I didn't try it myself but I found several claims that it works. I
see complaints that it always looks for _ldap._tcp and not _ldaps._tcp
as you might expect when using ldascheme=ldaps, but that doesn't seem
to be a big problem. As for ldaptls=1, that must work because it
doesn't even negotiate that until after the connection is made.
--
Thomas Munro
http://www.enterprisedb.com
From | Date | Subject | |
---|---|---|---|
Next Message | Daniel Gustafsson | 2019-02-02 00:35:51 | Re: Don't deform column-by-column in composite_to_json |
Previous Message | Andres Freund | 2019-02-01 23:21:16 | Don't deform column-by-column in composite_to_json |