CockroachDB supports the Generic Security Services API (GSSAPI) with Kerberos authentication. Although CockroachDB does not support communicating directly with an LDAP service, GSSAPI with Kerberos can be configured to communicate with your LDAP service to authenticate users.
This is an enterprise-only feature. You can use free trial credits to try it out.
Requirements
- A working Active Directory or Kerberos environment
- A Service Principal
- A GSSAPI-compatible PostgreSQL Client (psql, etc.)
- A client machine with a Kerberos client installed and configured
Configure KDC for CockroachDB
To use Kerberos authentication with CockroachDB, configure a Kerberos service principal name (SPN) for CockroachDB and generate a valid keytab file with the following specifications:
- Set the SPN to the name specified by your client driver. For example, if you use the psql client, set SPN to
postgres
. - Create SPNs for all DNS addresses that a user would use to connect to your CockroachDB cluster (including any TCP load balancers between the user and the CockroachDB node) and ensure that the keytab contains the keys for every SPN you create.
Active Directory
For Active Directory, the client syntax for generating a keytab that maps a service principal to the SPN is as follows:
ktpass -out {keytab_filename} \
-princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} \
-mapUser {Service_Principal}@{DOMAIN} \
-mapOp set -pType KRB5_NT_PRINCIPAL +rndPass \
-crypto AES256-SHA1
Example:
ktpass -out postgres.keytab \
-princ postgres/loadbalancer1.cockroach.industries@COCKROACH.INDUSTRIES \
-mapUser pguser@COCKROACH.INDUSTRIES \
-mapOp set -pType KRB5_NT_PRINCIPAL +rndPass \
-crypto AES256-SHA1
Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint. You may want to merge your keytabs together for easier management. You can do this using the ktpass
command, using the following syntax:
ktpass -out {new_keytab_filename} \
-in {old_keytab_filename} \
-princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} \
-mapUser {Service_Principal}@{DOMAIN} \
-mapOp add \
-pType KRB5_NT_PRINCIPAL +rndPass \
-crypto AES256-SHA1
Example (adds loadbalancer2
to the above example):
ktpass -out postgres_2lb.keytab \
-in postgres.keytab \
-princ postgres/loadbalancer2.cockroach.industries@COCKROACH.INDUSTRIES \
-mapUser pguser@COCKROACH.INDUSTRIES \
-mapOp add \
-pType KRB5_NT_PRINCIPAL +rndPass \
-crypto AES256-SHA1
MIT KDC
In MIT KDC, you cannot map a service principal to an SPN with a different username, so you will need to create a service principal that includes the SPN for your client.
create-user: kadmin.local -q "addprinc {SPN}/{CLIENT_FQDN}@{DOMAIN}" -pw "{initial_password}"
create-keytab: kadmin.local -q "ktadd -k keytab {SPN}/{CLIENT_FQDN}@{DOMAIN}"
Example:
kadmin.local -q "addprinc postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES" -pw "testing12345!"
kadmin.local -q "ktadd -k keytab postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES"
Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint. You may want to merge your keytabs together for easier management. The ktutil
command can be used to read multiple keytab files and output them into a single output here.
Configure the CockroachDB node
Copy the keytab file to a location accessible by the
cockroach
binary.Create certificates for inter-node and
root
user authentication:mkdir certs my-safe-directory
cockroach cert create-ca \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key
cockroach cert create-node \ localhost \ $(hostname) \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key
cockroach cert create-client root \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key
Provide the path to the keytab in the
KRB5_KTNAME
environment variable.Example:
export KRB5_KTNAME=/home/cockroach/postgres.keytab
Start a CockroachDB node:
cockroach start --certs-dir=certs --listen-addr=0.0.0.0
Connect to CockroachDB as
root
using theroot
client certificate generated above:cockroach sql --certs-dir=certs
- Note:You need the Enterprise license if you want to use the GSSAPI feature. However, if you only want to test that the GSSAPI setup is working, you do not need to enable an Enterprise license.
Enable GSSAPI authentication:
SET cluster setting server.host_based_authentication.configuration = 'host all all all gss include_realm=0';
Setting the
server.host_based_authentication.configuration
cluster setting to this particular value makes it mandatory for all non-root
users to authenticate using GSSAPI. Theroot
user is always an exception and remains able to authenticate using a valid client cert or a user password.The
include_realm=0
option is required to tell CockroachDB to remove the@DOMAIN.COM
realm information from the username. We do not support any advanced mapping of GSSAPI usernames to CockroachDB usernames right now. If you want to limit which realms' users can connect, you can also add one or morekrb_realm
parameters to the end of the line as an allowlist, as follows:host all all all gss include_realm=0 krb_realm=domain.com krb_realm=corp.domain.com
The syntax is based on the
pg_hba.conf
standard for PostgreSQL which is documented here. It can be used to exclude other users from Kerberos authentication.Create CockroachDB users for every Kerberos user. Ensure the username does not have the
DOMAIN.COM
realm information. For example, if one of your Kerberos users has a usernamecarl@realm.com
, then you need to create a CockroachDB user with the usernamecarl
:CREATE USER carl;
Grant privileges to the user:
GRANT ALL ON DATABASE defaultdb TO carl;
Configure the client
Install and configure your Kerberos client:
For CentOS/RHEL systems, run:
yum install krb5-user
For Ubuntu/Debian systems, run:
apt-get install krb5-user
Edit the
/etc/krb5.conf
file to include:[libdefaults] default_realm = {REALM} [realms] {REALM} = { kdc = {fqdn-kdc-server or ad-server} admin_server = {fqdn-kdc-server or ad-server} default_domain = {realm-lower-case} }
Example:
[libdefaults] default_realm = COCKROACH.INDUSTRIES [realms] COCKROACH.INDUSTRIES = { kdc = ad.cockroach.industries admin_server = ad.cockroach.industries default_domain = cockroach.industries }
Get a ticket for the db user:
kinit carl
Verify if a valid ticket has been generated:
klist
Connect to the cluster using the
cockroach sql
command as the Kerberos user:cockroach sql --certs-dir=certs -U carl
If you specified an Enterprise license earlier, the command succeeds. This indicates that the GSSAPI authentication was successful. Otherwise, the error
ERROR: use of GSS authentication requires an Enterprise license
is shown.