.. _kerberos:

*****************************************
`Enabling Kerberos Authentication`:index:
*****************************************

**Prerequisite:** Kerberos understanding and setup

Reference: https://web.mit.edu/kerberos/

To configure Kerberos authentication, you must setup your Kerberos Server and
obtain a ticket on the client using *kinit*.

Note: Active Directory users with Kerberos support do not require kinit.

To enable Kerberos authentication for pgAdmin, you must configure the
Kerberos settings in *config_local.py* or *config_system.py*
(see the :ref:`config.py <config_py>` documentation) on the
system where pgAdmin is installed in Server mode. You can copy these settings
from *config.py* file and modify the values for the following parameters.

.. csv-table::
   :header: "**Parameter**", "**Description**"
   :class: longtable
   :widths: 35, 55

   "AUTHENTICATION_SOURCES","The default value for this parameter is *internal*.
   To enable Kerberos authentication, you must include *kerberos* in the
   list of values for this parameter. you can modify the value as follows:

   * [‘kerberos’]: pgAdmin will use only Kerberos authentication.

   * [‘kerberos’, ‘internal’]: pgAdmin will first try to authenticate the user
     through kerberos. If that authentication fails, then it will return back
     to the login dialog where you need to provide internal pgAdmin user
     credentials for authentication."
   "KERBEROS_AUTO_CREATE_USER", "Set the value to *True* if you want to
   automatically create a pgAdmin user corresponding to a successfully
   authenticated Kerberos user. Please note that password is not stored in the
   pgAdmin database."
   "KRB_APP_HOST_NAME", "Specify the name of *pgAdmin webserver hostname*.
   Please note that if it is not set, it will take the value of
   *default_server* parameter."


Keytab file for HTTP Service
============================

* Generate the *Keytab* file for the HTTP service principal HTTP/<host-name>@realm,
  and copy it to the *pgAdmin* webserver machine. Ensure that the operating system
  user owning the *pgAdmin* webserver is the owner of this file and should be
  accessible by that user.

* Please note that either you should set *default_keytab_name* parameter in
  *krb5.conf* file or the environment variable *KRB5_KTNAME*. If not set then
  explicitly set *KRB_KTNAME* to the location of your *Keytab* file in the
  *config_local.py* or *config_system.py* file.

Apache HTTPD Configuration
==========================

If the *pgAdmin* server is under the Apache Server, then you need to add the
following parameters in *Directory* directive of
:ref:`Apache HTTPD Configuration <server_deployment>`:

   * WSGIScriptReloading On

   * WSGIPassAuthorization On


Browser settings to configure Kerberos Authentication
=====================================================

You need to configure the browser settings on the client machine to use
Kerberos authentication via *SPNEGO*.

- For Mozilla Firefox

  - Open the low level Firefox configuration page by entering *about:config* in
    the address bar.
  - In the Search text box, enter: *network.negotiate-auth.trusted-uris*
  - Double-click the *network.negotiate-auth.trusted-uris* preference and enter
    the hostname or the domain of the web server that is protected by Kerberos
    HTTP SPNEGO. Separate multiple domains and hostnames with a comma.
  - Click OK.

- For Google Chrome

  - On Windows:

    * Open the Control Panel to access the Internet Options dialog.
    * Select the Security tab.
    * Select the Local Intranet zone and click the Sites button.
    * Make sure that the first two options, *Include all local (intranet) sites
      not listed in other zones* and *Include all sites that bypass the proxy
      server* are checked.
    * Click Advanced and add the names of the domains that are protected by
      Kerberos HTTP SPNEGO, one at a time, to the list of websites. For example,
      myhost.example.com. Click Close.
    * Click OK to save your configuration changes.

  - On Linux or macOS:

    * Add the *--auth-server-whitelist* parameter to the google-chrome command.
      For example, to run Chrome from a Linux prompt, run the google-chrome
      command as follows:

    .. code-block:: text

       google-chrome --auth-server-whitelist = "hostname/domain"


PostgreSQL Server settings to configure Kerberos Authentication
===============================================================

* To connect the PostgreSQL server with Kerberos authentication, GSSAPI support
  has to be enabled when PostgreSQL is built and the necessary
  `configuration <https://www.postgresql.org/docs/current/gssapi-auth.html>`_
  has to be in place.

* In pgAdmin you need to enable Kerberos authentication for the PostgreSQL
  server by setting "Kerberos authentication" flag to True in the Server dialog.
  Once it is enabled, pgAdmin will not prompt for a password and will try to
  connect to the PostgreSQL server using Kerberos.

* Note that, you have to login into pgAdmin with Kerberos authentication to
  then connect to PostgreSQL using Kerberos.


Master Password
===============

In the multi user mode, pgAdmin uses user's login password to encrypt/decrypt the PostgreSQL server password.
In the Kerberos authentication, the pgAdmin user does not have the password, so we need an encryption key to store
the PostgreSQL server password for the servers which are not configured to use the Kerberos authentication.
To accomplish this, set the configuration parameter MASTER_PASSWORD to *True*, so upon setting the master password,
it will be used as an encryption key while storing the password. If it is False, the server password can not be stored.