VMware Greenplum 6 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " auth_file contains one line per user. Each line must have at least two 0 码力 | 2445 页 | 18.05 MB | 1 年前3
VMware Greenplum 6 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " auth_file contains one line per user. Each line must have at least two 0 码力 | 2374 页 | 44.90 MB | 1 年前3
VMware Tanzu Greenplum v6.23 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " VMware Tanzu Greenplum 6 Documentation VMware, Inc 1034 auth_file contains 0 码力 | 2298 页 | 40.94 MB | 1 年前3
VMware Tanzu Greenplum 6 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " auth_file contains one line per user. Each line must have at least two 0 码力 | 2311 页 | 17.58 MB | 1 年前3
VMware Greenplum v6.25 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " auth_file contains one line per user. Each line must have at least two 0 码力 | 2400 页 | 18.02 MB | 1 年前3
VMware Tanzu Greenplum v6.21 Documentationbefore sending it to Greenplum Database, once on the password and role name and then again with a salt value shared between the client and server, so the clear text password is never sent on the network encrypted with SCRAM-SHA-256, it has the format: SCRAM-SHA-256$:<salt>$ : where <salt>, , and are in base64-encoded format. This format is the "username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$ :<salt>$ : " auth_file contains one line per user. Each line must have at least two 0 码力 | 2025 页 | 33.54 MB | 1 年前3
VMware Greenplum v6.18 Documentation"username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$:<salt>$ : " auth_file contains one line per user. Each line must have at least two Database users from the pg_shadow view. PostgreSQL SCRAM secret format: SCRAM-SHA-256$ :<salt>$ : See the PostgreSQL documentation and RFC 5803 for details on this. VMware specify a user name, and the SCRAM secrets are identical in PgBouncer and the PostgreSQL server (same salt and iterations, not merely the same password). This is due to an inherent security property of SCRAM: 0 码力 | 1959 页 | 19.73 MB | 1 年前3
VMware Greenplum v6.19 Documentation"username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$:<salt>$ : " auth_file contains one line per user. Each line must have at least two Database users from the pg_shadow view. PostgreSQL SCRAM secret format: SCRAM-SHA-256$ :<salt>$ : See the PostgreSQL documentation and RFC 5803 for details on this. VMware specify a user name, and the SCRAM secrets are identical in PgBouncer and the PostgreSQL server (same salt and iterations, not merely the same password). This is due to an inherent security property of SCRAM: 0 码力 | 1972 页 | 20.05 MB | 1 年前3
VMware Greenplum v6.17 Documentation"username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$:<salt>$ : " auth_file contains one line per user. Each line must have at least two Database users from the pg_shadow view. PostgreSQL SCRAM secret format: SCRAM-SHA-256$ :<salt>$ : See the PostgreSQL documentation and RFC 5803 for details on this. VMware specify a user name, and the SCRAM secrets are identical in PgBouncer and the PostgreSQL server (same salt and iterations, not merely the same password). This is due to an inherent security property of SCRAM: 0 码力 | 1893 页 | 17.62 MB | 1 年前3
VMware Tanzu Greenplum v6.20 Documentation"username1" "password" ... "username2" "md5abcdef012342345" ... "username2" "SCRAM-SHA-256$:<salt>$ : " auth_file contains one line per user. Each line must have at least two Database users from the pg_shadow view. PostgreSQL SCRAM secret format: SCRAM-SHA-256$ :<salt>$ : See the PostgreSQL documentation and RFC 5803 for details on this. The specify a user name, and the SCRAM secrets are identical in PgBouncer and the PostgreSQL server (same salt and iterations, not merely the same password). This is due to an inherent security property of SCRAM: 0 码力 | 1988 页 | 20.25 MB | 1 年前3
共 11 条
- 1
- 2













