Greetings, * Khushboo Vashi (khushboo.va...@enterprisedb.com) wrote: > Please find the attached patch to support Kerberos Authentication in > pgAdmin RM 5457. > > The patch introduces a new pluggable option for Kerberos authentication, > using SPNEGO to forward kerberos tickets through a browser which will > bypass the login page entirely if the Kerberos Authentication succeeds.
I've taken a (very short) look at this as it's certainly something that I'm interested in and glad to see work is being done on it. I notice that 'delegated_creds' is being set but it's unclear to me how they're actually being used (if at all), which is a very important part of Kerberos. What's commonly done with mod_auth_kerb/mod_auth_gss is that the delegated credentials are stored on the filesystem in a temporary directory and then an environment variable is set to signal to libpq / the Kerberos libraries that the delegated credentials can be found in the temporary file. I don't see any of that happening in this patch- is that already handled in some way? If not, what's the plan for making that work? Also important is to make sure that this approach will work for constrainted delegation implementations. Thanks! Stephen
signature.asc
Description: PGP signature