You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/user/content/security/self-managed/authentication.md
+65Lines changed: 65 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,71 @@ users:
82
82
[^1]: The `mz_system` user is also used by the Materialize Operator for upgrades
83
83
and maintenance tasks.
84
84
85
+
## Configuring SASL/SCRAM authentication
86
+
87
+
{{< note >}}
88
+
SASL/SCRAM-SHA-256 authentication requires Materialize `v26.0.0` or later.
89
+
{{</ note >}}
90
+
91
+
SASL/SCRAM-SHA-256 authentication is a challenge-response authentication mechanism
92
+
that provides security for **PostgreSQL wire protocol connections**. It is
93
+
compatible with PostgreSQL clients that support SCRAM-SHA-256.
94
+
95
+
To configure Self-Managed Materialize for SASL/SCRAM authentication:
96
+
97
+
| Configuration | Description
98
+
|---------------| ------------
99
+
|`spec.authenticatorKind` | Set to `Sasl` to enable SASL/SCRAM-SHA-256 authentication for PostgreSQL connections.
100
+
|`external_login_password_mz_system` | To the Kubernetes Secret referenced by `spec.backendSecretName`, add the secret key `external_login_password_mz_system`. This is the password for the `mz_system` user [^1], who is the only user initially available when SASL authentication is enabled.
101
+
102
+
For example, if using Kind, in the `sample-materialize.yaml` file:
0 commit comments