Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
Greenplum
Gpdb
提交
32dbb993
G
Gpdb
项目概览
Greenplum
/
Gpdb
通知
7
Star
1
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
G
Gpdb
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
32dbb993
编写于
12月 18, 2019
作者:
D
David Yozie
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Docs - removing unused passwordcheck docs source
上级
ec3282ea
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
0 addition
and
27 deletion
+0
-27
gpdb-doc/dita/ref_guide/modules/passwordcheck.xml
gpdb-doc/dita/ref_guide/modules/passwordcheck.xml
+0
-27
未找到文件。
gpdb-doc/dita/ref_guide/modules/passwordcheck.xml
已删除
100644 → 0
浏览文件 @
ec3282ea
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
<topic
id=
"topic_lpy_ytc_vbb"
>
<title>
passwordcheck
</title>
<body>
<p>
The
<codeph>
passwordcheck
</codeph>
module checks users' passwords whenever they are set with
<codeph>
CREATE ROLE
</codeph>
or
<codeph>
ALTER ROLE
</codeph>
. If a password is considered too
weak, it will be rejected and the command will terminate with an error.
</p>
<p>
To enable this module, add
<codeph>
'$libdir/passwordcheck'
</codeph>
to
<codeph>
shared_preload_libraries
</codeph>
in
<filepath>
postgresql.conf
</filepath>
, then
restart the server.
</p>
<p>
By default, this module enforces a few simple rules for password strength, which you can
modify or extend as you see fit. It is also possible to adapt this module to your needs by
modifying the
<filepath>
Makefile
</filepath>
and rebuilding the module.
<note
class=
"- topic/note "
type=
"caution"
>
To prevent unencrypted passwords from being sent across
the network, written to the server log, or otherwise stolen by a database administrator,
Greenplum Database enables you to supply pre-encrypted passwords. Many client programs make
use of this functionality and encrypt the password before sending it to the server. This
limits the usefulness of the
<codeph>
passwordcheck
</codeph>
module, because in that case it
can only try to guess the password. For this reason,
<codeph>
passwordcheck
</codeph>
is not
recommended if your security requirements are high. It is more secure to use an external
authentication method such as Kerberos than to rely on passwords within the database.
Alternatively, you could modify
<codeph>
passwordcheck
</codeph>
to reject pre-encrypted
passwords, but forcing users to set their passwords in clear text carries its own security
risks.
</note></p>
</body>
</topic>
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录