Spec-Zone .ru
спецификации, руководства, описания, API

6.3.7. Pluggable Authentication

6.3.7.1. The Native Authentication Plugins
6.3.7.2. The SHA-256 Authentication Plugin
6.3.7.3. The PAM Authentication Plugin
6.3.7.4. The Windows Native Authentication Plugin
6.3.7.5. The Cleartext Client-Side Authentication Plugin
6.3.7.6. The Socket Peer-Credential Authentication Plugin
6.3.7.7. The Test Authentication Plugin

When a client connects to the MySQL server, the server uses the user name provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client.

In MySQL 5.6, the server authenticates clients using plugins, as follows:

Pluggable authentication enables two important capabilities:

Several authentication plugins are available in MySQL. The following sections provide details about specific plugins.

Note

For information about current restrictions on the use of pluggable authentication, including which connectors support which plugins, see Section E.9, "Restrictions on Pluggable Authentication".

Third-party connector developers should read that section to determine the extent to which a connector can take advantage of pluggable authentication capabilities and what steps to take to become more compliant.

If you are interested in writing your own authentication plugins, see Section 23.2.4.9, "Writing Authentication Plugins".

In general, pluggable authentication uses corresponding plugins on the server and client sides, so you use a given authentication method like this:

The remainder of this section provides general instructions for installing and using authentication plugins. The instructions use an an example authentication plugin included in MySQL distributions (see Section 6.3.7.7, "The Test Authentication Plugin"). The procedure is similar for other authentication plugins; substitute the appropriate plugin and file names.

The example authentication plugin has these characteristics:

Install and use the example authentication plugin as follows:

  1. Make sure that the plugin library is installed on the server and client hosts.

  2. Install the server-side test plugin at server startup or at runtime:

    • To install the plugin at startup, use the --plugin-load option. With this plugin-loading method, the option must be given each time you start the server. For example, use these lines in a my.cnf option file:

      [mysqld]plugin-load=test_plugin_server=auth_test_plugin.so
    • To install the plugin at runtime, use the INSTALL PLUGIN statement:

      mysql> INSTALL PLUGIN
                                      test_plugin_server SONAME 'auth_test_plugin.so';

      This installs the plugin permanently and need be done only once.

      PAM authentication, when not done through proxy users or groups, requires the MySQL account to have the same user name as the Unix account. Because MySQL user names are limited to 16 characters (see Section 6.2.2, "Privilege System Grant Tables"), this limits PAM nonproxy authentication to Unix accounts with names of at most 16 characters.

  3. Verify that the plugin is installed. For example, use SHOW PLUGINS:

    mysql> SHOW PLUGINS\G...*************************** 21. row ***************************   Name: test_plugin_server Status: ACTIVE   Type: AUTHENTICATIONLibrary: auth_test_plugin.soLicense: GPL

    For other ways to check the plugin, see Section 5.1.8.2, "Obtaining Server Plugin Information".

  4. To specify that a MySQL user must be authenticated using the plugin, name it in the IDENTIFIED WITH clause of the CREATE USER statement that creates the user:

    CREATE USER 'testuser'@'localhost' IDENTIFIED WITH test_plugin_server;
  5. Connect to the server using a client program. The test plugin authenticates the same way as native MySQL authentication, so provide the usual --user and --password options that you normally use to connect to the server. For example:

    shell> mysql --user=your_name --password=your_pass

    For connections by testuser, the server sees that the account must be authenticated using the server-side plugin named test_plugin_server and communicates to the client program which client-side plugin it must use—in this case, auth_test_plugin.

    In the case that the account uses the authentication method that is the default for both the server and the client program, the server need not communicate to the client which plugin to use, and a round trip in client/server negotiation can be avoided. Currently this is true for accounts that use native MySQL authentication (mysql_native_password).

    The --default-auth=plugin_name option can be specified on the mysql command line to make explicit which client-side plugin the program can expect to use, although the server will override this if the user account requires a different plugin.

    If mysql does not find the plugin, specify a --plugin-dir=dir_name option to indicate where the plugin is located.

Note

If you start the server with the --skip-grant-tables option, authentication plugins are not used even if loaded because the server performs no client authentication and permits any client to connect. Because this is insecure, you might want to use --skip-grant-tables in conjunction with --skip-networking to prevent remote clients from connecting.