summaryrefslogtreecommitdiff
path: root/pgsql_mib_pieces/pg_authid.mib
diff options
context:
space:
mode:
Diffstat (limited to 'pgsql_mib_pieces/pg_authid.mib')
-rw-r--r--pgsql_mib_pieces/pg_authid.mib132
1 files changed, 132 insertions, 0 deletions
diff --git a/pgsql_mib_pieces/pg_authid.mib b/pgsql_mib_pieces/pg_authid.mib
new file mode 100644
index 0000000..f61b472
--- /dev/null
+++ b/pgsql_mib_pieces/pg_authid.mib
@@ -0,0 +1,132 @@
+-- TODO: Because pg_authid is shared across databases, find a way to ensure I cover all configured connections exactly once
+pgsqlPgAuthidTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF pgsqlPgAuthidEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The catalog pg_authid contains information about database authorization identifiers (roles). A role subsumes the concepts of 'users' and 'groups'. A user is essentially just a role with the rolcanlogin flag set. Any role (with or without rolcanlogin) may have other roles as members; see pg_auth_members. Since this catalog contains passwords, it must not be publicly readable. pg_roles is a publicly readable view on pg_authid that blanks out the password field. Because user identities are cluster-wide, pg_authid is shared across all databases of a cluster: there is only one copy of pg_authid per cluster, not one per database."
+ ::= { pgsqlCatalogTables 7 }
+
+pgsqlPgAuthidEntry OBJECT-TYPE
+ SYNTAX PgsqlPgAuthidEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "pg_authid entry"
+ INDEX { pgsnmpdConnID, pgsqlPgAuthidEntryOID }
+ ::= { pgsqlPgAuthidTable 1 }
+
+PgsqlPgAuthidEntry ::=
+ SEQUENCE {
+ pgsqlPgAuthidEntryOID INTEGER,
+ pgsqlPgAuthidRolname INTEGER,
+ pgsqlPgAuthidRolsuper TruthValue,
+ pgsqlPgAuthidRolinherit TruthValue,
+ pgsqlPgAuthidRolcreaterole TruthValue,
+ pgsqlPgAuthidRolcreatedb TruthValue,
+ pgsqlPgAuthidRolcatupdate TruthValue,
+ pgsqlPgAuthidRolcanlogin TruthValue,
+ pgsqlPgAuthidRolconnlimit INTEGER,
+ pgsqlPgAuthidRolpassword DisplayString,
+ pgsqlPgAuthidRolvaliduntil DateAndTime,
+ pgsqlPgAuthidRolconfig DisplayString
+ }
+
+pgsqlPgAuthidEntryOID OBJECT-TYPE
+ SYNTAX INTEGER
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "OID of this entry"
+ ::= { pgsqlPgAuthidEntry 1 }
+
+pgsqlPgAuthidRolname OBJECT-TYPE
+ SYNTAX INTEGER
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role name"
+ ::= { pgsqlPgAuthidEntry 2 }
+
+pgsqlPgAuthidRolsuper OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role has superuser privileges"
+ ::= { pgsqlPgAuthidEntry 3 }
+
+pgsqlPgAuthidRolinherit OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role automatically inherits privileges of roles it is a member of"
+ ::= { pgsqlPgAuthidEntry 4 }
+
+pgsqlPgAuthidRolcreaterole OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role may create more roles"
+ ::= { pgsqlPgAuthidEntry 5 }
+
+pgsqlPgAuthidRolcreatedb OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role may create databases"
+ ::= { pgsqlPgAuthidEntry 6 }
+
+pgsqlPgAuthidRolcatupdate OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role may update system catalogs directly. (Even a superuser may not do this unless this column is true)"
+ ::= { pgsqlPgAuthidEntry 7 }
+
+pgsqlPgAuthidRolcanlogin OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Role may log in. That is, this role can be given as the initial session authorization identifier"
+ ::= { pgsqlPgAuthidEntry 8 }
+
+pgsqlPgAuthidRolconnlimit OBJECT-TYPE
+ SYNTAX INTEGER
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "For roles that can log in, this sets maximum number of concurrent connections this role can make. -1 means no limit"
+ ::= { pgsqlPgAuthidEntry 9 }
+
+pgsqlPgAuthidRolpassword OBJECT-TYPE
+ SYNTAX DisplayString
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Password (possibly encrypted); NULL if none"
+ ::= { pgsqlPgAuthidEntry 10 }
+
+pgsqlPgAuthidRolvaliduntil OBJECT-TYPE
+ SYNTAX DateAndTime
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Password expiry time (only used for password authentication); NULL if no expiration"
+ ::= { pgsqlPgAuthidEntry 11 }
+
+pgsqlPgAuthidRolconfig OBJECT-TYPE
+ SYNTAX DisplayString
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Session defaults for run-time configuration variables"
+ ::= { pgsqlPgAuthidEntry 12 }
+
+
+---------------------------------------