Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Kerberos authentication support #392

Open
akiraly opened this issue Mar 5, 2021 · 4 comments
Open

Add Kerberos authentication support #392

akiraly opened this issue Mar 5, 2021 · 4 comments
Labels
status: ideal-for-contribution An issue that a contributor can help us with type: enhancement A general enhancement

Comments

@akiraly
Copy link

akiraly commented Mar 5, 2021

Feature Request

The traditional Postgres JDBC driver supports Kerberos authentication (kerberosServerName, jaasApplicationName,... connection properties).
In tightly controlled environments it is enforced to use Kerberos, blocking developers from using the r2dbc driver instead of the jdbc one.

Is your feature request related to a problem? Please describe

Can't use r2db driver because it doesn't support kerberos authentication.

Describe the solution you'd like

To be able to use kerberos authentication - similarly to how it works with the postgres jdbc driver.

Describe alternatives you've considered

Maybe some kind of r2dbc to jdbc bridge (is that even possible?) so we can wrap the postgres jdbc into r2dbc and use it that way (together with Spring reactive transaction management).

Teachability, Documentation, Adoption, Migration Strategy

Need to document the new connection properties in the documentation.

@akiraly akiraly added the type: enhancement A general enhancement label Mar 5, 2021
@mp911de
Copy link
Collaborator

mp911de commented Mar 8, 2021

This looks like a duplicate of #315.

In any case, contributions are highly welcome.

@frankgh
Copy link
Collaborator

frankgh commented Mar 9, 2021

@mp911de I'd like to contribute this feature. Let me know if no one has picked it up already.

@davecramer
Copy link
Member

So I muddled this up on the JDBC driver. I tried to emulate what libpq does when making the initial connection. They look for an existing key cache and then send the startup packet. Unfortunately java does not provide a native way to do this (easily) I would suggest using a connection parameter and if the user wants a kerberos encrypted connection then attempt it.

@mp911de
Copy link
Collaborator

mp911de commented May 17, 2022

@frankgh feel free to give it a spin. I'm totally unfamiliar with setting up a Kerberos environment, so any help is appreciated.

@mp911de mp911de added the status: ideal-for-contribution An issue that a contributor can help us with label May 17, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
status: ideal-for-contribution An issue that a contributor can help us with type: enhancement A general enhancement
Projects
None yet
Development

No branches or pull requests

4 participants