Skip to content
Use LDAP permissions in PostgreSQL
Ruby
Branch: master
Clone or download

Latest commit

Fetching latest commit…
Cannot retrieve the latest commit at this time.

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
config
exe
lib Whole bunch of changes Mar 13, 2018
test Fix tests on Windows Mar 13, 2018
.autotest Sync roles works, sync membership not yet May 18, 2011
.gitignore Move from Hoe to Bundler Feb 6, 2018
.travis.yml Add CI tests on Travis-ci and Appveyor Feb 6, 2018
CHANGELOG.md
Gemfile Remove possibility to use postgres-pr Feb 6, 2018
LICENSE.txt Move from Hoe to Bundler Feb 6, 2018
Manifest.txt Update Manifest.txt Jul 13, 2011
README.md Update README regarding the use of bundler [ci skip] Mar 14, 2018
Rakefile Move from Hoe to Bundler Feb 6, 2018
appveyor.yml Add CI tests on Travis-ci and Appveyor Feb 6, 2018
pg-ldap-sync.gemspec

README.md

Build Status Build status

Use LDAP permissions in PostgreSQL

DESCRIPTION:

LDAP is often used for a centralized user and role management in an enterprise environment. PostgreSQL offers different authentication methods, like LDAP, SSPI, GSSAPI or SSL. However, for any method the user must already exist in the database, before the authentication can be used. There is currently no direct authorization of database users on LDAP. So roles and memberships has to be administered twice.

This program helps to solve the issue by synchronizing users, groups and their memberships from LDAP to PostgreSQL. Access to LDAP is used read-only. pg_ldap_sync issues proper CREATE ROLE, DROP ROLE, GRANT and REVOKE commands to synchronize users and groups.

It is meant to be started as a cron job.

FEATURES:

  • Configurable per YAML config file
  • Can use Active Directory as LDAP-Server
  • Nested groups/roles supported
  • Set scope of considered users/groups on LDAP and PG side
  • Test mode which doesn't do any changes to the DBMS
  • Both LDAP and PG connections can be secured by SSL/TLS

REQUIREMENTS:

  • Ruby-2.0+, JRuby-1.2+
  • LDAP-v3 server
  • PostgreSQL-server v9.0+

INSTALL:

Install Ruby:

Install pg-ldap-sync and required dependencies:

  gem install pg-ldap-sync

Install from Git:

  git clone https://github.com/larskanis/pg-ldap-sync.git
  cd pg-ldap-sync
  gem install bundler
  bundle install
  bundle exec rake install

USAGE:

Create a config file based on config/sample-config.yaml or even better config/sample-config2.yaml

Run in test-mode:

  pg_ldap_sync -c my_config.yaml -vv -t

Run in modify-mode:

  pg_ldap_sync -c my_config.yaml -vv

TEST:

There is a small test suite in the test directory that runs against an internal LDAP server and a PostgreSQL server. Ensure pg_ctl, initdb and psql commands are in the PATH like so:

  cd pg-ldap-sync
  bundle install
  PATH=$PATH:/usr/lib/postgresql/10/bin/ bundle exec rake test

ISSUES:

  • There is currently no way to set certain user attributes in PG based on individual attributes in LDAP (expiration date etc.)

License

The gem is available as open source under the terms of the MIT License.

You can’t perform that action at this time.