Environment:
  VM -  FreeIPA providing LDAP/Kerberos (FreeIPA 4.10.0) on Rocky Linux 9.1
  VM - Rocky Linux 9.1 as Docker Host
         -- PGADMIN (Container) 6.15
  VM - Rocky Linux 9.1 providing Postgres 15

>From an IPA joined client Kerberos SSO works to the PGAdmin container (no
extra login prompt)
>From an IPA joined client with psql installed I can connect to Postgres
using Kerberos. I see the  "GSSAPI - Encrypted connection" in the
connection.

When I attempt to connect with the same account from the PGAdmin web
application I receive the following error in the web interface.
"GSSAPI continuation error. No credentials were supplied, or the
credentials were unavailable or inaccessible. No Kerberos credentials
available.(Default cache: FILE:/tmp/krb5cc_5050)

On Postgres I checked the logs and it looks like the right user is being
sent....but not authenticated:
2023-04-11 13:31:53.364 +07 [3858] FATAL:  GSSAPI authentication failed for
user "a01-6"
2023-04-11 13:31:53.364 +07 [3858] DETAIL:  Connection matched pg_hba.conf
line 91: "host    all             all             192.168.1.0/24
 gss include_realm=0 krb_realm=MY.LAB"

Initially I thought it might be the typical kerberos double-hop issue with
Kerberos delegation and I found the following article on Kerberos
delelgation.

https://access.redhat.com/documentation/en%02us/red_hat_enterprise_linux/8/html/configuring_and_managing_identity_management/assembly_using-constrained-delegation-in-idm_configuring-and-managing-idm#con_constrained-delegation-in-identity-management_assembly_using-constrained-delegation-in-idm

I configured the delegation (First time in the Linux world I've done this
so maybe it's wrong?) using:

ipa servicedelegationtarget-add
ipa servicedelegationtarget-ad-member
ipa servicedelegationrule-add
ipa servicedelegationrule-add-member
ipa servicedelegationrule-add-target

Then rebooted everything, but same results. Is there a way in the PGAdmin
container to turn up logging to see what's happening?

Thanks,
Greg

Reply via email to