当前位置:网站首页>Database postragesq PAM authentication
Database postragesq PAM authentication
2022-07-05 01:13:00 【wx5d0241bb88268】
20.13. PAM authentication
This authentication method operates similarly password, It's just that it uses PAM ( Plug in verification module ) As an authentication mechanism . default PAM The service name is postgresql.PAM It is only used to verify the user name / Password pair and optionally verify the connected remote hostname or IP Address . therefore , In the use of PAM Before certification , The user must already exist in the database . of PAM For more information , Please read Linux-PAM page 2
.
The following supported configuration options are used for PAM:
pamservice
PAM The service name .
pam_use_hostname
To judge whether or not to pass PAM_RHOST Item handle remote IP The address or hostname is provided to PAM modular . By default... Is used IP Address . Set this option to 1 You can use the resolved hostname . Hostname resolution may cause login delays ( Most of PAM Configuration does not use this information , Therefore, only those specially created to take advantage of this information PAM You need to consider this setting when configuring ).
If PAM Is set to read /etc/shadow, Authentication will fail , because PostgreSQL The server consists of a non root User start . However , When PAM Configured to use LDAP Or other authentication verification methods, this is not a problem .
边栏推荐
- 【海浪建模2】三维海浪建模以及海浪发电机建模matlab仿真
- Pandora IOT development board learning (RT thread) - Experiment 4 buzzer + motor experiment [key external interrupt] (learning notes)
- Global and Chinese markets for industrial X-ray testing equipment 2022-2028: Research Report on technology, participants, trends, market size and share
- Pycharm professional download and installation tutorial
- 【海浪建模3】三维随机真实海浪建模以及海浪发电机建模matlab仿真
- Redis(1)之Redis简介
- 当产业互联网时代真正发展完善之后,将会在每一个场景见证巨头的诞生
- [wave modeling 1] theoretical analysis and MATLAB simulation of wave modeling
- 【微处理器】基于FPGA的微处理器VHDL开发
- dotnet-exec 0.6.0 released
猜你喜欢
I was beaten by the interviewer because I didn't understand the sorting
【大型电商项目开发】性能压测-优化-中间件对性能的影响-40
User login function: simple but difficult
JS implementation determines whether the point is within the polygon range
What if the programmer's SQL data script coding ability is weak and Bi can't do it?
整理混乱的头文件,我用include what you use
Delaying wages to force people to leave, and the layoffs of small Internet companies are a little too much!
Take you ten days to easily complete the go micro service series (IX. link tracking)
Expansion operator: the family is so separated
Actual combat simulation │ JWT login authentication
随机推荐
LeetCode周赛 + AcWing周赛(T4/T3)分析对比
各大主流编程语言性能PK,结果出乎意料
【海浪建模1】海浪建模的理论分析和matlab仿真
Discrete mathematics: propositional symbolization of predicate logic
7. Scala process control
Digital DP template
【CTF】AWDP总结(Web)
“薪资倒挂”、“毕业生平替” 这些现象说明测试行业已经...
SAP UI5 应用开发教程之一百零六 - 如何提高 SAP UI5 应用路由 url 的可读性试读版
What you learned in the eleventh week
How to use words to describe breaking change in Spartacus UI of SAP e-commerce cloud
实战模拟│JWT 登录认证
[Yocto RM]11 - Features
Global and Chinese markets for stratospheric UAV payloads 2022-2028: Research Report on technology, participants, trends, market size and share
Basic operations of database and table ----- delete index
Jcenter () cannot find Alibaba cloud proxy address
Inventory of more than 17 typical security incidents in January 2022
抓包整理外篇——————状态栏[ 四]
When the industrial Internet era is truly developed and improved, it will witness the birth of giants in every scene
Applet live + e-commerce, if you want to be a new retail e-commerce, use it!