Environment:
VM - FreeIPA providing LDAP/Kerberos (FreeIPA 4.10.0) on Rocky Linux 9.1
VM - Rocky Linux 9.1 as Docker Host
-- PGADMIN (Container) 6.15
VM - Rocky Linux 9.1 providing Postgres 15
>From an IPA joined client Kerberos SSO works to the PGAdmin container (no
extra login prompt)
>From an IPA joined client with psql installed I can connect to Postgres
using Kerberos. I see the "GSSAPI - Encrypted connection" in the
connection.
When I attempt to connect with the same account from the PGAdmin web
application I receive the following error in the web interface.
"GSSAPI continuation error. No credentials were supplied, or the
credentials were unavailable or inaccessible. No Kerberos credentials
available.(Default cache: FILE:/tmp/krb5cc_5050)
On Postgres I checked the logs and it looks like the right user is being
sent....but not authenticated:
2023-04-11 13:31:53.364 +07 [3858] FATAL: GSSAPI authentication failed for
user "a01-6"
2023-04-11 13:31:53.364 +07 [3858] DETAIL: Connection matched pg_hba.conf
line 91: "host all all 192.168.1.0/24
gss include_realm=0 krb_realm=MY.LAB"
Initially I thought it might be the typical kerberos double-hop issue with
Kerberos delegation and I found the following article on Kerberos
delelgation.
https://access.redhat.com/documentation/en%02us/red_hat_enterprise_linux/8/html/configuring_and_managing_identity_management/assembly_using-constrained-delegation-in-idm_configuring-and-managing-idm#con_constrained-delegation-in-identity-management_assembly_using-constrained-delegation-in-idm
I configured the delegation (First time in the Linux world I've done this
so maybe it's wrong?) using:
ipa servicedelegationtarget-add
ipa servicedelegationtarget-ad-member
ipa servicedelegationrule-add
ipa servicedelegationrule-add-member
ipa servicedelegationrule-add-target
Then rebooted everything, but same results. Is there a way in the PGAdmin
container to turn up logging to see what's happening?
Thanks,
Greg