admin:processes:db_accounts
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
admin:processes:db_accounts [2017/01/19 15:35] – [PostgreSQL (Shinji)] localadmin | admin:processes:db_accounts [2017/03/25 23:22] (current) – [PostgreSQL (Shinji)] localadmin | ||
---|---|---|---|
Line 18: | Line 18: | ||
===== MS SQL Student Server (msdb.cs.ndsu.nodak.edu) ===== | ===== MS SQL Student Server (msdb.cs.ndsu.nodak.edu) ===== | ||
- | ------ | + | {{: |
This server exists solely for students to use in coursework. | This server exists solely for students to use in coursework. | ||
Line 26: | Line 27: | ||
===== MS SQL (Gendo) Production Server ===== | ===== MS SQL (Gendo) Production Server ===== | ||
- | ---- | + | {{: |
^ Server ^ Account purpose ^ Authentication source ^ | ^ Server ^ Account purpose ^ Authentication source ^ | ||
| gendo.cs.ndsu.nodak.edu | Student account :?:| Computer Science domain | | | gendo.cs.ndsu.nodak.edu | Student account :?:| Computer Science domain | | ||
Line 99: | Line 101: | ||
===== Oracle (Asuka) ===== | ===== Oracle (Asuka) ===== | ||
- | ---- | + | {{: |
+ | |||
+ | <color # | ||
^ Server ^ Account purpose ^ Authentication source ^ | ^ Server ^ Account purpose ^ Authentication source ^ | ||
| asuka.cs.ndsu.nodak.edu | student/ | | asuka.cs.ndsu.nodak.edu | student/ | ||
Line 172: | Line 177: | ||
Accounts can also be made using the TOra Security Manager. Users created in this way need to be given a random password, and the CSCI366 role. They also need to be given the default and temporary tablespace ' | Accounts can also be made using the TOra Security Manager. Users created in this way need to be given a random password, and the CSCI366 role. They also need to be given the default and temporary tablespace ' | ||
+ | |||
+ | |||
+ | |||
+ | |||
===== MySQL (Rei) ===== | ===== MySQL (Rei) ===== | ||
- | ---- | + | {{: |
^ Server ^ Account purpose ^ Authentication source ^ | ^ Server ^ Account purpose ^ Authentication source ^ | ||
| rei.cs.ndsu.nodak.edu | student/ | | rei.cs.ndsu.nodak.edu | student/ | ||
Line 198: | Line 208: | ||
** USERS THAT ALREADY HAVE ACCOUNTS WILL CAUSE ISSUES WITH THESE SCRIPTS.** Currently, users that currently have DB accounts should NOT be fed into the script, it will cause the process to fail. The script should be modified such that the DB is checked for an existing account for each user. | ** USERS THAT ALREADY HAVE ACCOUNTS WILL CAUSE ISSUES WITH THESE SCRIPTS.** Currently, users that currently have DB accounts should NOT be fed into the script, it will cause the process to fail. The script should be modified such that the DB is checked for an existing account for each user. | ||
+ | |||
+ | |||
===== PostgreSQL (Shinji) ===== | ===== PostgreSQL (Shinji) ===== | ||
- | ---- | + | {{: |
+ | |||
+ | <color # | ||
^ Server ^ Account purpose ^ Authentication source ^ | ^ Server ^ Account purpose ^ Authentication source ^ | ||
| shinji.cs.ndsu.nodak.edu | student account | Computer Science domain | | | shinji.cs.ndsu.nodak.edu | student account | Computer Science domain | | ||
Line 216: | Line 231: | ||
For login roles that are to authenticate with student accounts (via PAM), generate a very long (32-character or so) password and enter a comment indicating that the account is using PAM for authentication. | For login roles that are to authenticate with student accounts (via PAM), generate a very long (32-character or so) password and enter a comment indicating that the account is using PAM for authentication. | ||
+ | |||
+ | ==== Auth ==== | ||
+ | |||
+ | PostgreSQL uses the file at / | ||
+ | |||
+ | This file works in a method such that the first applicable match for ' | ||
+ | |||
+ | The file has 5 entries per line: ' | ||
+ | |||
+ | ^ Entry ^ Purpose ^ | ||
+ | | type | matches based on the type of access | | ||
+ | | database | matches based on the database being requested | | ||
+ | | user | matches based on username of the connecting client | | ||
+ | | host | matches based on the host/IP of the connecting client, CIDR addresses are usable, leave blank for type ' | ||
+ | | method | defines the method of authentication | | ||
+ | |||
+ | ^ type ^ description ^ | ||
+ | | local | local machine connection | | ||
+ | | host | network-based connection | | ||
+ | | hostssl | SSL-based network connection | | ||
+ | |||
+ | ^ method ^ description ^ | ||
+ | | md5 | auths against password in the database | | ||
+ | | ident | local system account authentication | | ||
+ | | gss | kerberos ticket based authentication | | ||
+ | | pamservice=< | ||
+ | |||
+ | There is a list of accounts enabled for PAM-based auth in / | ||
+ | |||
+ | On any modifications to pam_accounts or pg_hba.conf, | ||
+ | |||
admin/processes/db_accounts.1484861731.txt.gz · Last modified: by localadmin