Re: [HACKERS] More flexible LDAP auth search filters? - Mailing list pgsql-hackers

From Mark Cave-Ayland
Subject Re: [HACKERS] More flexible LDAP auth search filters?
Date
Msg-id 9e31d7d9-f3d6-b625-0aa8-7b888ebb8c8d@ilande.co.uk
Whole thread Raw
In response to Re: [HACKERS] More flexible LDAP auth search filters?  (Thomas Munro <thomas.munro@enterprisedb.com>)
Responses Re: [HACKERS] More flexible LDAP auth search filters?
List pgsql-hackers
On 16/07/17 23:26, Thomas Munro wrote:

> Thank you very much for this feedback and example, which I used in the
> documentation in the patch.  I see similar examples in the
> documentation for other things on the web.
> 
> I'll leave it up to Magnus and Stephen to duke it out over whether we
> want to encourage LDAP usage, extend documentation to warn about
> cleartext passwords with certain LDAP implementations or
> configurations, etc etc.  I'll add this patch to the commitfest and
> get some popcorn.

If it helps, we normally recommend that clients use ldaps for both AD
and UNIX environments, although this can be trickier from an
administrative perspective in AD environments because it can require
changes to the Windows firewall and certificate installation.

Whilst OpenLDAP will support ldap+starttls you can end up with some
clients with starttls either disabled or misconfigured sending plaintext
passwords over the wire regardless, so it's generally easiest to
firewall ldap port 389 at the edge of the trusted VLAN so that only
ldaps port 636 connections make it out onto the untrusted network
hosting the local AD/OpenLDAP server.


ATB,

Mark.



pgsql-hackers by date:

Previous
From: Thomas Munro
Date:
Subject: Re: [HACKERS] More flexible LDAP auth search filters?
Next
From: Thomas Munro
Date:
Subject: Re: [HACKERS] More flexible LDAP auth search filters?