Table of Contents

Search

  1. Preface
  2. Introduction to PostgreSQL Connector
  3. Connections for PostgreSQL
  4. Mappings and mapping tasks with PostgreSQL Connector
  5. PostgreSQL objects in mapping tasks
  6. Lookup transformation
  7. SQL transformation
  8. Migrating a mapping
  9. PostgreSQL SQL ELT optimization
  10. Data type reference

PostgreSQL Connector

PostgreSQL Connector

Configuring Kerberos authentication

Configuring Kerberos authentication

Before you use Kerberos authentication to connect to PostgreSQL on Linux or Windows, the organization administrator needs to perform the prerequisite tasks.
  1. To configure the Java Authentication and Authorization Service configuration file (JAAS), perform the following tasks:
    1. Create a JAAS configuration file on the Secure Agent machine.
    2. Add the following entries to the JAAS configuration file:
      JDBC_DRIVER_01 { com.sun.security.auth.module.Krb5LoginModule required useTicketCache=true; };
  2. To configure the
    krb5.conf
    file, perform the following tasks:
    1. Create a
      krb5.conf
      file on the Secure Agent machine.
    2. Add the details of the Key Distribution Center (KDC) and admin server to the
      krb5.conf
      file in the following format:
      [libdefaults] default_realm = <Realm name> forwardable = true ticket_lifetime = 24h [realms] <REALM NAME> = { kdc = <Location where KDC is installed> admin_server = <Location where KDC is installed> } [domain_realm] <domain name or host name> = <Domain name or host name of Kerberos> <domain name or host name> = <Domain name or host name of Kerberos>
  3. Set the following environment variables on the Secure Agent machine.
    For more information about the required environment variables, see Setting environment variables.
  4. Restart the Secure Agent.
  5. To generate the credential cache file on the Secure Agent machine and use Kerberos authentication to connect to PostgreSQL, perform the following tasks:
    1. From the command line on the Secure Agent machine, run the following command and specify the PostgreSQL user name and realm name:
      Kinit <user name>@<realm_name>
    2. When prompted, enter the password for the Kerberos principal user.

0 COMMENTS

We’d like to hear from you!