Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for SCRAM-SHA-256 password authentication #776

Open
Sourav1407 opened this issue Mar 31, 2020 · 3 comments
Open

Add support for SCRAM-SHA-256 password authentication #776

Sourav1407 opened this issue Mar 31, 2020 · 3 comments

Comments

@Sourav1407
Copy link

What would you like to be added:

The superuser and the replication user is not working with SCRAM-SHA-256 password authentication method. When the authentication method is trust or MD5 it is working but when the PostgreSQL authentication method is changed to SCRAM-SHA-256 the application is failing to connect to the database. The Stolon architecture document (https://github.com/sorintlab/stolon/blob/master/doc/architecture.md) quotes "Currently trust (password-less) and md5 password based authentication are supported. In the future, different authentication mechanisms will be added." Hence would like to have the SHA-256 encryption support added .

Why is this needed:

This is needed for enhancing the security as one of our client wants to enhance the encryption method from MD5 to SCRAM-SHA-256. We are able to implement in our non-HA ecosystem but we are not able to implement it in HA PostgreSQL as it is implemented with Stolon and the application is failing when the PostgreSQL encryption method is changed from MD5 to SHA-256.

@Sourav1407
Copy link
Author

Any update on this? Does stolon support SCRAM-SHA-256 now

@aaranmcguire
Copy link

Just wanted to bump this. Maybe we could rebase the PR and allow the tests to run correctly?

@Neustradamus
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants