Re: Design Considerations for New Authentication Methods - Mailing list pgsql-hackers

From Stephen Frost
Subject Re: Design Considerations for New Authentication Methods
Date
Msg-id 20061102204309.GR24675@kenobi.snowman.net
Whole thread Raw
In response to Re: Design Considerations for New Authentication Methods  (Richard Troy <rtroy@ScienceTools.com>)
List pgsql-hackers
* Richard Troy (rtroy@ScienceTools.com) wrote:
> ...I thought you said this _needs_ to be done - by using words like
> "unacceptible" and "required" - and I disagree. There's a difference
> between what needs to be done and what is desired to be done. Further, I
> never said "shouldn't."

For PG to be an option in certain environments, it *needs* to be done
because in those environments username/password are *unacceptable*.
Additionally, there's someone (actually, more than one it seems) who's
willing to spend the time and energy to implement it.  If it's not
necessary for your environment, great!  If you weren't suggesting it
shouldn't be implemented or accepted then I've truely got no idea what
the intent of your previous mail was.
Enjoy,
    Stephen

pgsql-hackers by date:

Previous
From: Richard Troy
Date:
Subject: Re: Design Considerations for New Authentication Methods
Next
From: "Henry B. Hotz"
Date:
Subject: Re: Design Considerations for New Authentication Methods