--- title: About the postgres_ident_conf Resource platform: linux --- # postgres\_ident\_conf Use the `postgres_ident_conf` InSpec audit resource to test the client authentication data defined in the pg_hba.conf file.
## Syntax An `postgres_ident_conf` InSpec audit resource block declares client authentication data that should be tested: describe postgres_ident_conf.where { pg_username == 'filter_value' } do its('attribute') { should eq ['value'] } end where * `'attribute'` is a attribute in the pg ident configuration file * `'filter_value'` is the value that is to be filtered for * `'value'` is the value that is to be matched expected
## Properties 'conf_file', 'map_name', 'params', 'pg_username', 'system_username'
## Property Examples ### map_name([String]) `address` returns a an array of strings that matches the where condition of the filter table describe pg_hba_conf.where { pg_username == 'name' } do its('map_name') { should eq ['value'] } end ### pg_username([String]) `pg_username` returns a an array of strings that matches the where condition of the filter table describe pg_hba_conf.where { pg_username == 'name' } do its('pg_username') { should eq ['value'] } end ### system_username([String]) `system_username` returns a an array of strings that matches the where condition of the filter table describe pg_hba_conf.where { pg_username == 'name' } do its('system_username') { should eq ['value'] } end
## Matchers This InSpec audit resource matches any service that is listed in the pg ident configuration file. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/). its('pg_username') { should_not eq ['peer'] } or: its('map_name') { should eq ['value'] } For example: describe postgres_ident_conf.where { pg_username == 'name' } do its('system_username') { should eq ['value'] } its('map_name') { should eq ['value'] } end