GSSAPI Authentication (Enterprise)

On this page Carat arrow pointing down
Warning:
As of May 12, 2021, CockroachDB v19.2 is no longer supported. For more details, refer to the Release Support Policy.

CockroachDB supports the Generic Security Services API (GSSAPI) with Kerberos authentication.

Note:

GSSAPI authentication is an enterprise-only feature.

Requirements

  • A working Active Directory or Kerberos environment
  • A Service Principal
  • A GSSAPI-compatible Postgres Client (psql, etc.)
  • A client machine with a Kerberos client installed and configured

Configuring KDC for CockroachDB

To use Kerberos authentication with CockroachDB, configure a Kerberos service principal name (SPN) for CockroachDB and generate a valid keytab file with the following specifications:

  • Set the SPN to the name specified by your client driver. For example, if you use the psql client, set SPN to postgres.
  • Create SPNs for all DNS addresses that a user would use to connect to your CockroachDB cluster (including any TCP load balancers between the user and the CockroachDB node) and ensure that the keytab contains the keys for every SPN you create.

Active Directory

For Active Directory, the client syntax for generating a keytab that maps a service principal to the SPN is as follows:

icon/buttons/copy
$ ktpass -out {keytab_filename} -princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} -mapUser {Service_Principal}@{DOMAIN} -mapOp set -pType KRB5_NT_PRINCIPAL +rndPass -crypto AES256-SHA1

Example:

icon/buttons/copy
$ ktpass -out postgres.keytab -princ postgres/loadbalancer1.cockroach.industries@COCKROACH.INDUSTRIES -mapUser pguser@COCKROACH.INDUSTRIES -mapOp set -pType KRB5_NT_PRINCIPAL +rndPass -crypto AES256-SHA1

Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint. You may want to merge your keytabs together for easier management. You can do this using the ktpass command, using the following syntax:

icon/buttons/copy
$ ktpass -out {new_keytab_filename} -in {old_keytab_filename} -princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} -mapUser {Service_Principal}@{DOMAIN} -mapOp add -pType KRB5_NT_PRINCIPAL +rndPass -crypto AES256-SHA1

Example (adds loadbalancer2 to the above example):

icon/buttons/copy
$ ktpass -out postgres_2lb.keytab -in postgres.keytab -princ postgres/loadbalancer2.cockroach.industries@COCKROACH.INDUSTRIES -mapUser pguser@COCKROACH.INDUSTRIES -mapOp add  -pType KRB5_NT_PRINCIPAL +rndPass -crypto AES256-SHA1

MIT KDC

In MIT KDC, you cannot map a service principal to an SPN with a different username, so you will need to create a service principal that includes the SPN for your client.

icon/buttons/copy
$ create-user: kadmin.local -q "addprinc {SPN}/{CLIENT_FQDN}@{DOMAIN}" -pw "{initial_password}"
icon/buttons/copy
$ create-keytab: kadmin.local -q "ktadd -k keytab {SPN}/{CLIENT_FQDN}@{DOMAIN}"

Example:

icon/buttons/copy
$ kadmin.local -q "addprinc postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES" -pw "testing12345!"
$ kadmin.local -q "ktadd -k keytab postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES"

Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint. You may want to merge your keytabs together for easier management. The ktutil command can be used to read multiple keytab files and output them into a single output here.

Configuring the CockroachDB node

  1. Copy the keytab file to a location accessible by the cockroach binary.

  2. Create certificates for inter-node and root user authentication:

    icon/buttons/copy
    $ mkdir certs my-safe-directory
    
    icon/buttons/copy
    $ cockroach cert create-ca \
    --certs-dir=certs \
    --ca-key=my-safe-directory/ca.key
    
    icon/buttons/copy
    $ cockroach cert create-node \
    localhost \
    $(hostname) \
    --certs-dir=certs \
    --ca-key=my-safe-directory/ca.key
    
    icon/buttons/copy
    $ cockroach cert create-client \
    root \
    --certs-dir=certs \
    --ca-key=my-safe-directory/ca.key
    
  3. Provide the path to the keytab in the KRB5_KTNAME environment variable.

    Example: export KRB5_KTNAME=/home/cockroach/postgres.keytab

  4. Start a CockroachDB node:

    icon/buttons/copy
    $ cockroach start \
    --certs-dir=certs \
    --listen-addr=0.0.0.0
    
  5. Connect to CockroachDB as root using the root client certificate generated above:

    icon/buttons/copy
    $ cockroach sql --certs-dir=certs
    
  6. Enable an enterprise license.

    Note:
    You need the enterprise license if you want to use the GSSAPI feature. However, if you only want to test that the GSSAPI setup is working, you do not need to enable an enterprise license.

  7. Enable GSSAPI authentication:

    icon/buttons/copy
    > SET cluster setting server.host_based_authentication.configuration = 'host all all all gss include_realm=0';
    

    Setting the server.host_based_authentication.configuration cluster setting makes it mandatory for all users (except root) to authenticate using GSSAPI. The root user is still required to authenticate using its client certificate.

    The include_realm=0 option is required to tell CockroachDB to remove the @DOMAIN.COM realm information from the username. We do not support any advanced mapping of GSSAPI usernames to CockroachDB usernames right now. If you want to limit which realms' users can connect, you can also add one or more krb_realm parameters to the end of the line as an allowlist, as follows: host all all all gss include_realm=0 krb_realm=domain.com krb_realm=corp.domain.com

    The syntax is based on the pg_hba.conf standard for PostgreSQL which is documented here. It can be used to exclude other users from Kerberos authentication.

  8. Create CockroachDB users for every Kerberos user. Ensure the username does not have the DOMAIN.COM realm information. For example, if one of your Kerberos users has a username carl@realm.com, then you need to create a CockroachDB user with the username carl:

    icon/buttons/copy
    > CREATE USER carl;
    

    Grant privileges to the user:

    icon/buttons/copy
    > GRANT ALL ON DATABASE defaultdb TO carl;
    

Configuring the client

Note:

The cockroach sql shell does not yet support GSSAPI authentication. You need to use a GSSAPI-compatible Postgres client, such as Postgres's psql client.

  1. Install and configure your Kerberos client:

    For CentOS/RHEL systems, run:

    icon/buttons/copy
    $ yum install krb5-user
    

    For Ubuntu/Debian systems, run:

    icon/buttons/copy
    $ apt-get install krb5-user
    

    Edit the /etc/krb5.conf file to include:

    icon/buttons/copy
           [libdefaults]
             default_realm = {REALM}
    
           [realms]
             {REALM} = {
              kdc = {fqdn-kdc-server or ad-server}
              admin_server = {fqdn-kdc-server or ad-server}
              default_domain = {realm-lower-case}
            }
    

    Example:

    icon/buttons/copy
    
           [libdefaults]
             default_realm = COCKROACH.INDUSTRIES
    
           [realms]
             COCKROACH.INDUSTRIES = {
              kdc = ad.cockroach.industries
              admin_server = ad.cockroach.industries
              default_domain = cockroach.industries
            }
    
  2. Get a ticket for the db user:

    icon/buttons/copy
    $ kinit carl
    
  3. Verify if a valid ticket has been generated:

    icon/buttons/copy
    $ klist
    
  4. Install the Postgres client (for example, postgresql-client-10 Debian package from postgresql.org).

  5. Use the psql client, which supports GSSAPI authentication, to connect to CockroachDB:

    icon/buttons/copy
    $ psql "postgresql://localhost:26257/defaultdb?sslmode=require" -U carl
    
  6. If you specified an enterprise license earlier, you should now have a Postgres shell in CockroachDB, indicating that the GSSAPI authentication was successful. If you did not specify an enterprise license, you'll see a message like this: psql: ERROR: use of GSS authentication requires an enterprise license. If you see this message, GSSAPI authentication is set up correctly.

See also


Yes No
On this page

Yes No