gooderp18绿色标准版
No puede seleccionar más de 25 temas Los temas deben comenzar con una letra o número, pueden incluir guiones ('-') y pueden tener hasta 35 caracteres de largo.

58 líneas
5.7KB

  1. <?xml version="1.0" encoding="UTF-8" standalone="no"?>
  2. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>20.3. Authentication Methods</title><link rel="stylesheet" type="text/css" href="stylesheet.css" /><link rev="made" href="pgsql-docs@lists.postgresql.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.79.1" /><link rel="prev" href="auth-username-maps.html" title="20.2. User Name Maps" /><link rel="next" href="auth-trust.html" title="20.4. Trust Authentication" /></head><body><div xmlns="http://www.w3.org/TR/xhtml1/transitional" class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="5" align="center">20.3. Authentication Methods</th></tr><tr><td width="10%" align="left"><a accesskey="p" href="auth-username-maps.html" title="20.2. User Name Maps">Prev</a> </td><td width="10%" align="left"><a accesskey="u" href="client-authentication.html" title="Chapter 20. Client Authentication">Up</a></td><th width="60%" align="center">Chapter 20. Client Authentication</th><td width="10%" align="right"><a accesskey="h" href="index.html" title="PostgreSQL 12.4 Documentation">Home</a></td><td width="10%" align="right"> <a accesskey="n" href="auth-trust.html" title="20.4. Trust Authentication">Next</a></td></tr></table><hr></hr></div><div class="sect1" id="AUTH-METHODS"><div class="titlepage"><div><div><h2 class="title" style="clear: both">20.3. Authentication Methods</h2></div></div></div><p>
  3. <span class="productname">PostgreSQL</span> provides various methods for
  4. authenticating users:
  5. </p><div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
  6. <a class="link" href="auth-trust.html" title="20.4. Trust Authentication">Trust authentication</a>, which
  7. simply trusts that users are who they say they are.
  8. </p></li><li class="listitem"><p>
  9. <a class="link" href="auth-password.html" title="20.5. Password Authentication">Password authentication</a>, which
  10. requires that users send a password.
  11. </p></li><li class="listitem"><p>
  12. <a class="link" href="gssapi-auth.html" title="20.6. GSSAPI Authentication">GSSAPI authentication</a>, which
  13. relies on a GSSAPI-compatible security library. Typically this is
  14. used to access an authentication server such as a Kerberos or
  15. Microsoft Active Directory server.
  16. </p></li><li class="listitem"><p>
  17. <a class="link" href="sspi-auth.html" title="20.7. SSPI Authentication">SSPI authentication</a>, which
  18. uses a Windows-specific protocol similar to GSSAPI.
  19. </p></li><li class="listitem"><p>
  20. <a class="link" href="auth-ident.html" title="20.8. Ident Authentication">Ident authentication</a>, which
  21. relies on an <span class="quote">“<span class="quote">Identification Protocol</span>”</span> (RFC 1413)
  22. service on the client's machine. (On local Unix-socket connections,
  23. this is treated as peer authentication.)
  24. </p></li><li class="listitem"><p>
  25. <a class="link" href="auth-peer.html" title="20.9. Peer Authentication">Peer authentication</a>, which
  26. relies on operating system facilities to identify the process at the
  27. other end of a local connection. This is not supported for remote
  28. connections.
  29. </p></li><li class="listitem"><p>
  30. <a class="link" href="auth-ldap.html" title="20.10. LDAP Authentication">LDAP authentication</a>, which
  31. relies on an LDAP authentication server.
  32. </p></li><li class="listitem"><p>
  33. <a class="link" href="auth-radius.html" title="20.11. RADIUS Authentication">RADIUS authentication</a>, which
  34. relies on a RADIUS authentication server.
  35. </p></li><li class="listitem"><p>
  36. <a class="link" href="auth-cert.html" title="20.12. Certificate Authentication">Certificate authentication</a>, which
  37. requires an SSL connection and authenticates users by checking the
  38. SSL certificate they send.
  39. </p></li><li class="listitem"><p>
  40. <a class="link" href="auth-pam.html" title="20.13. PAM Authentication">PAM authentication</a>, which
  41. relies on a PAM (Pluggable Authentication Modules) library.
  42. </p></li><li class="listitem"><p>
  43. <a class="link" href="auth-bsd.html" title="20.14. BSD Authentication">BSD authentication</a>, which
  44. relies on the BSD Authentication framework (currently available
  45. only on OpenBSD).
  46. </p></li></ul></div><p>
  47. </p><p>
  48. Peer authentication is usually recommendable for local connections,
  49. though trust authentication might be sufficient in some circumstances.
  50. Password authentication is the easiest choice for remote connections.
  51. All the other options require some kind of external security
  52. infrastructure (usually an authentication server or a certificate
  53. authority for issuing SSL certificates), or are platform-specific.
  54. </p><p>
  55. The following sections describe each of these authentication methods
  56. in more detail.
  57. </p></div><div class="navfooter"><hr /><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="auth-username-maps.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="client-authentication.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="auth-trust.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">20.2. User Name Maps </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> 20.4. Trust Authentication</td></tr></table></div></body></html>
上海开阖软件有限公司 沪ICP备12045867号-1