Now that you've set up your postgresql database, you'll probably want
to make it available so that  users can access it from their
machines.  This section will show you the basic steps to allow
connectivity from other machines in your network in a trusted
environment.  In order to make your connection more secure, you should
read the PostgreSQL documentation, available at
The PostgreSQL website,
specifically the chapter entitled "Client Authentication".
The first thing you'll want to do is find the configuration files
you'll need to modify.  The files are postgresql.conf
and pg_hba.conf,
which according to the PostgreSQL manual should be in /usr/local/pgsql/data/, but on Red Hat
and Fedora Core distributions they can be found in /var/lib/pgsql/data/.  If you have
trouble finding them, use the locate command.
root# locate postgresql.conf
/var/lib/pgsql/data/postgresql.conf
Next, tell PostgreSQL that its ok to accept connections via TCP/IP.
Log in as root, and modify the the postgresql.conf
file, change the
tcpip_socket value to true, and uncomment the line if necessary.
Then save the file.
Then tell PostgreSQL to allow connections from the ip addresses in
your local area network by adding a host line to pg_hba.conf:
# TYPE  DATABASE USER   IP-ADDRESS        IP-MASK       METHOD
local    all 	 all    ident                           sameuser
host    all   all   192.168.1.0  255.255.255.0  trust
This line will allow all machines in the IP range of 192.168.1.1 to
192.168.1.254 to access any PostgreSQL database on the server.  You
may need to change the IP address and mask depending on your local
network.  Contact your network administrator for help in this area.
Finally, restart the PostgreSQL service:
bash$ pg_ctl -D data -l logfile restart
You should now be able to open and save  plans from other machines
in your local area network by including a host name or IP address in
the Server box in the  Open from or Save to Database dialog.
Once again, you are strongly advised to consult the PostgreSQL
documentation,
Client Authentication section to fully understand the levels of
security that can be implemented to suit your needs.  The level of
trust that is granted in this example is not suitable for most
production environments.
