![]() Simple enough that it can be run from an SSH console without tunneling so not much need for SSH Tunneling here. SSH Tunneling and why you might need itįirst off we'd like to say the command-line tool psql that also comes with PostgreSQL is nice and has its charm. To make it a little more interesting we shall demonstrate how to do this for PgAdmin III. In this article we shall cover how to use PuTTY's SSH Tunneling feature to access a remote PostgreSQL server that doesn't allow Of configuring the pg_hba.conf PostgreSQL server file that controls user access check out Hubert Lubaczewski's “FATAL: Ident authentication failed”, or how cool ideas get bad usage schemas To use PgAdmin III from a local windows workstation against a remote PostgreSQL server even in cases where the linux/unix PostgreSQL pg_hba.conf and nf file only allow local connections or non-SSH traffic is blocked by PuTTY comes in handy both as an SSH terminal console and as a SSH Tunneling tool which allows you for example ![]() ![]() As an added benefit it is free and open source with a generous license so it is commonly embedded in PuTTY fits into that class of tools we affectionately call Swiss Army Knives because it is PuTTY was developed by Simon Tatham and is a very common light-weight MIT-Licensedįree and open source Secure Shell (SSH) client for connecting to Linux/Unix systems via a Teletype (TTY) terminal emulation mode console.Ĭurrently there are ports for Microsoft Windows, other unix like systems,Īnd ports in progress for Mac OSX and Symbian mobile phone OS. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |