From 786e2f6871628ea373e8976ec07fb69e77ca184d Mon Sep 17 00:00:00 2001 From: Bruce Momjian <bruce@momjian.us> Date: Sat, 20 Feb 2010 19:21:14 +0000 Subject: [PATCH] Clarify documentation about username mapping when authenticating with GSSAPI or Kerberos. Ian Turner --- doc/src/sgml/client-auth.sgml | 31 ++++++++++++++++++------------- 1 file changed, 18 insertions(+), 13 deletions(-) diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml index feb9511c5e6..26a7de6d0a8 100644 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@ -1,4 +1,4 @@ -<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.131 2010/02/03 17:25:05 momjian Exp $ --> +<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.132 2010/02/20 19:21:14 momjian Exp $ --> <chapter id="client-authentication"> <title>Client Authentication</title> @@ -824,23 +824,28 @@ omicron bryanh guest1 The following configuration options are supported for <productname>GSSAPI</productname>: <variablelist> <varlistentry> - <term><literal>map</literal></term> + <term><literal>include_realm</literal></term> <listitem> <para> - Allows for mapping between system and database usernames. See - <xref linkend="auth-username-maps"> for details. + If set to <literal>1</>, the realm name from the authenticated user + principal is included in the system user name that's passed through + username mapping (<xref linkend="auth-username-maps">). This is + useful for handling users from multiple realms. </para> </listitem> </varlistentry> <varlistentry> - <term><literal>include_realm</literal></term> + <term><literal>map</literal></term> <listitem> <para> - If set to <literal>1</>, the realm name from the authenticated user - principal is included in the system user name that's passed through - username mapping (<xref linkend="auth-username-maps">). This is - useful for handling users from multiple realms. + Allows for mapping between system and database usernames. See + <xref linkend="auth-username-maps"> for details. For a Kerboros + principal <literal>username/hostbased@EXAMPLE.COM</literal>, the + username used for mapping is <literal>username/hostbased</literal> + if <literal>include_realm</literal> is disabled, and + <literal>username/hostbased@EXAMPLE.COM</literal> if + <literal>include_realm</literal> is enabled. </para> </listitem> </varlistentry> @@ -1027,10 +1032,10 @@ omicron bryanh guest1 <para> When connecting to the database make sure you have a ticket for a principal matching the requested database user name. For example, for - database user name <literal>fred</>, both principal - <literal>fred@EXAMPLE.COM</> and - <literal>fred/users.example.com@EXAMPLE.COM</> could be used to - authenticate to the database server. + database user name <literal>fred</>, principal + <literal>fred@EXAMPLE.COM</> would be able to connect. To also allow + principle <literal>fred/users.example.com@EXAMPLE.COM</>, use a username + map, as described in <xref linkend="auth-username-maps">. </para> <para> -- GitLab