CockroachDB supports the Generic Security Services API (GSSAPI) with Kerberos authentication. Although CockroachDB does not support communicating directly with an LDAP service, GSSAPI with Kerberos can be configured to communicate with your LDAP service to authenticate users.
Requirements
- A working Active Directory or Kerberos environment
- A Service Principal
- A GSSAPI-compatible PostgreSQL Client (psql, etc.)
- A client machine with a Kerberos client installed and configured
Configure KDC for CockroachDB
To use Kerberos authentication with CockroachDB, configure a Kerberos service principal name (SPN) for CockroachDB and generate a valid keytab file with the following specifications:
- Set the SPN to the name specified by your client driver. For example, if you use the psql client, set SPN to postgres.
- Create SPNs for all DNS addresses that a user would use to connect to your CockroachDB cluster (including any TCP load balancers between the user and the CockroachDB node) and ensure that the keytab contains the keys for every SPN you create.
Active Directory
For Active Directory, the client syntax for generating a keytab that maps a service principal to the SPN is as follows:
ktpass -out {keytab_filename} \
  -princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} \
  -mapUser {Service_Principal}@{DOMAIN} \
  -mapOp set -pType KRB5_NT_PRINCIPAL +rndPass \
  -crypto AES256-SHA1
Example:
ktpass -out postgres.keytab \
  -princ postgres/loadbalancer1.cockroach.industries@COCKROACH.INDUSTRIES \
  -mapUser pguser@COCKROACH.INDUSTRIES \
  -mapOp set -pType KRB5_NT_PRINCIPAL +rndPass \
  -crypto AES256-SHA1
Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint.  You may want to merge your keytabs together for easier management.  You can do this using the ktpass command, using the following syntax:
ktpass -out {new_keytab_filename} \
  -in {old_keytab_filename} \
  -princ {Client_SPN}/{NODE/LB_FQDN}@{DOMAIN} \
  -mapUser {Service_Principal}@{DOMAIN} \
  -mapOp add \
  -pType KRB5_NT_PRINCIPAL +rndPass \
  -crypto AES256-SHA1
Example (adds loadbalancer2 to the above example):
ktpass -out postgres_2lb.keytab \
  -in postgres.keytab \
  -princ postgres/loadbalancer2.cockroach.industries@COCKROACH.INDUSTRIES \
  -mapUser pguser@COCKROACH.INDUSTRIES \
  -mapOp add \
  -pType KRB5_NT_PRINCIPAL +rndPass \
  -crypto AES256-SHA1
MIT KDC
In MIT KDC, you cannot map a service principal to an SPN with a different username, so you will need to create a service principal that includes the SPN for your client.
create-user: kadmin.local -q "addprinc {SPN}/{CLIENT_FQDN}@{DOMAIN}" -pw "{initial_password}"
create-keytab: kadmin.local -q "ktadd -k keytab {SPN}/{CLIENT_FQDN}@{DOMAIN}"
Example:
kadmin.local -q "addprinc postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES" -pw "testing12345!"
kadmin.local -q "ktadd -k keytab postgres/client2.cockroach.industries@COCKROACH.INDUSTRIES"
Copy the resulting keytab to the database nodes. If clients are connecting to multiple addresses (more than one load balancer, or clients connecting directly to nodes), you will need to generate a keytab for each client endpoint.  You may want to merge your keytabs together for easier management.  The ktutil command can be used to read multiple keytab files and output them into a single output here.
Configure the CockroachDB node
- Copy the keytab file to a location accessible by the - cockroachbinary.
- Create certificates for inter-node and - rootuser authentication:- mkdir certs my-safe-directory- cockroach cert create-ca \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key- cockroach cert create-node \ localhost \ $(hostname) \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key- cockroach cert create-client root \ --certs-dir=certs \ --ca-key=my-safe-directory/ca.key
- Provide the path to the keytab in the - KRB5_KTNAMEenvironment variable.- Example: - export KRB5_KTNAME=/home/cockroach/postgres.keytab
- Start a CockroachDB node: - cockroach start --certs-dir=certs --listen-addr=0.0.0.0
- Connect to CockroachDB as - rootusing the- rootclient certificate generated above:- cockroach sql --certs-dir=certs
- Note:You need the Enterprise license if you want to use the GSSAPI feature. However, if you only want to test that the GSSAPI setup is working, you do not need to enable an Enterprise license.
- Enable GSSAPI authentication: - SET cluster setting server.host_based_authentication.configuration = 'host all all all gss include_realm=0';- Setting the - server.host_based_authentication.configurationcluster setting to this particular value makes it mandatory for all non-- rootusers to authenticate using GSSAPI. The- rootuser is always an exception and remains able to authenticate using a valid client cert or a user password.- The - include_realm=0option is required to tell CockroachDB to remove the- @DOMAIN.COMrealm information from the username. We do not support any advanced mapping of GSSAPI usernames to CockroachDB usernames right now. If you want to limit which realms' users can connect, you can also add one or more- krb_realmparameters to the end of the line as an allowlist, as follows:- host all all all gss include_realm=0 krb_realm=domain.com krb_realm=corp.domain.com- The syntax is based on the - pg_hba.confstandard for PostgreSQL which is documented here. It can be used to exclude other users from Kerberos authentication.
- Create CockroachDB users for every Kerberos user. Ensure the username does not have the - DOMAIN.COMrealm information. For example, if one of your Kerberos users has a username- carl@realm.com, then you need to create a CockroachDB user with the username- carl:- CREATE USER carl;- Grant privileges to the user: - GRANT ALL ON DATABASE defaultdb TO carl;
Configure the client
- Install and configure your Kerberos client: - For CentOS/RHEL systems, run: - yum install krb5-user- For Ubuntu/Debian systems, run: - apt-get install krb5-user- Edit the - /etc/krb5.conffile to include:- [libdefaults] default_realm = {REALM} [realms] {REALM} = { kdc = {fqdn-kdc-server or ad-server} admin_server = {fqdn-kdc-server or ad-server} default_domain = {realm-lower-case} }- Example: - [libdefaults] default_realm = COCKROACH.INDUSTRIES [realms] COCKROACH.INDUSTRIES = { kdc = ad.cockroach.industries admin_server = ad.cockroach.industries default_domain = cockroach.industries }
- Get a ticket for the db user: - kinit carl
- Verify if a valid ticket has been generated: - klist
- Connect to the cluster using the - cockroach sqlcommand as the Kerberos user:- cockroach sql --certs-dir=certs -U carl
- If you specified an Enterprise license earlier, the command succeeds. This indicates that the GSSAPI authentication was successful. Otherwise, the error - ERROR: use of GSS authentication requires an Enterprise licenseis shown.