Just in case others follow in my footsteps - this may prove to be
helpful.
Summary of problem: CentOS 4.4 - SELinux enabled - authorizing pam based
users
### Created file /etc/pam.d/postgresql (I'm using LDAP) [*]
# cat /etc/pam.d/postgresql
#%PAM-1.0
auth required pam_stack.so service=
On Thu, 2006-11-09 at 16:34 -0300, Alvaro Herrera wrote:
> Tom Lane wrote:
> > Craig White <[EMAIL PROTECTED]> writes:
> > > I haven't had to fool too much with pam for authenticating other
> > > services so I'm a little bit out of my knowledge base but I know that it
> > > was simple to add netata
Tom Lane wrote:
> Craig White <[EMAIL PROTECTED]> writes:
> > I haven't had to fool too much with pam for authenticating other
> > services so I'm a little bit out of my knowledge base but I know that it
> > was simple to add netatalk into the pam authentication and expected that
> > postgresql wou
Craig White <[EMAIL PROTECTED]> writes:
> On Thu, 2006-11-09 at 11:51 -0500, Tom Lane wrote:
>> FWIW, we ship this PAM config file in the Red Hat PG RPMs:
> that doesn't work at all... /var/log/messages reports...
Sorry, I should have mentioned that that was for recent Fedora branches.
In RHEL4 I
On Thu, 2006-11-09 at 11:51 -0500, Tom Lane wrote:
> Craig White <[EMAIL PROTECTED]> writes:
> > I haven't had to fool too much with pam for authenticating other
> > services so I'm a little bit out of my knowledge base but I know that it
> > was simple to add netatalk into the pam authentication a
Craig White <[EMAIL PROTECTED]> writes:
> I haven't had to fool too much with pam for authenticating other
> services so I'm a little bit out of my knowledge base but I know that it
> was simple to add netatalk into the pam authentication and expected that
> postgresql would be similar.
FWIW, we s
On Thu, 2006-11-09 at 12:34 -0300, Alvaro Herrera wrote:
> Craig White wrote:
>
> > logs say...
> > Nov 8 20:18:26 srv1 postgresql: Starting postgresql service: succeeded
> > Nov 8 20:18:39 srv1 postgres[21020]: PAM audit_open() failed:
> > Permission denied
> > Nov 8 20:18:39 srv1 postgres[21
Craig White wrote:
> logs say...
> Nov 8 20:18:26 srv1 postgresql: Starting postgresql service: succeeded
> Nov 8 20:18:39 srv1 postgres[21020]: PAM audit_open() failed:
> Permission denied
> Nov 8 20:18:39 srv1 postgres[21020]: [2-1] LOG: pam_authenticate
> failed: System error
> Nov 8 20:1
CentOS 4.4 which means postgresql-server-7.4.13-2.RHEL4.1
I'm starting to deal with the notion of allowing other users access
(read only) to a db.
Experimenting on my own db...
hostall main_user 192.168.2.10255.255.255.0 trust
hostall all 127.0.0.1 2
Hi all,
suppose that I want to allow one user local access to
template1 under the database account postgres (which is the
superuser for my PostgreSQL). pg_hba.conf contains this:
local all postgresident sameuser
I would then set up pg_ident.conf like this:
postgre
10 matches
Mail list logo