From 6eb9c5a5657d1fe77b55cc261450f3538d35a94d Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 4 May 2024 14:19:15 +0200 Subject: Adding upstream version 13.4. Signed-off-by: Daniel Baumann --- doc/src/sgml/html/auth-pam.html | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 doc/src/sgml/html/auth-pam.html (limited to 'doc/src/sgml/html/auth-pam.html') diff --git a/doc/src/sgml/html/auth-pam.html b/doc/src/sgml/html/auth-pam.html new file mode 100644 index 0000000..dda83df --- /dev/null +++ b/doc/src/sgml/html/auth-pam.html @@ -0,0 +1,31 @@ + +20.13. PAM Authentication

20.13. PAM Authentication

+ This authentication method operates similarly to + password except that it uses PAM (Pluggable + Authentication Modules) as the authentication mechanism. The + default PAM service name is postgresql. + PAM is used only to validate user name/password pairs and optionally the + connected remote host name or IP address. Therefore the user must already + exist in the database before PAM can be used for authentication. For more + information about PAM, please read the + + Linux-PAM Page. +

+ The following configuration options are supported for PAM: +

pamservice

+ PAM service name. +

pam_use_hostname

+ Determines whether the remote IP address or the host name is provided + to PAM modules through the PAM_RHOST item. By + default, the IP address is used. Set this option to 1 to use the + resolved host name instead. Host name resolution can lead to login + delays. (Most PAM configurations don't use this information, so it is + only necessary to consider this setting if a PAM configuration was + specifically created to make use of it.) +

+

Note

+ If PAM is set up to read /etc/shadow, authentication + will fail because the PostgreSQL server is started by a non-root + user. However, this is not an issue when PAM is configured to use + LDAP or other authentication methods. +

\ No newline at end of file -- cgit v1.2.3