当前位置:网站首页>PostgreSQL 修改数据库用户的密码
PostgreSQL 修改数据库用户的密码
2022-07-06 13:27:00 【ac.char】
pg_hba.conf
,认证设置成md5
认证连接出现:
postgresql FATAL: password authentication failed for user "postgres"
编辑pg_hba.conf
,将md5
认证修改成trust
认证,编辑后退出保存
执行pg_ctl reload
加载生效
psql
连接,用alter role
修改密码
执行以下命令
alter role postgres with password '新密码';
查看当前postgresql 有多少用户,及对应的密码
select rolname,rolpassword from pg_authid;
退出psql
编辑pg_hba.conf
,将turst
认证修改成md5
认证,编辑后退出保存
执行pg_ctl reload
加载生效
边栏推荐
- 嵌入式开发的7大原罪
- Summary of cross partition scheme
- document. Usage of write () - write text - modify style and position control
- In JS, string and array are converted to each other (II) -- the method of converting array into string
- ICML 2022 | flowformer: task generic linear complexity transformer
- Forward maximum matching method
- Study notes of grain Mall - phase I: Project Introduction
- The underlying implementation of string
- Tiktok will push the independent grass planting app "praiseworthy". Can't bytes forget the little red book?
- Chris LATTNER, the father of llvm: why should we rebuild AI infrastructure software
猜你喜欢
Five wars of Chinese Baijiu
966 minimum path sum
Seven original sins of embedded development
【Redis设计与实现】第一部分 :Redis数据结构和对象 总结
缓存更新策略概览(Caching Strategies Overview)
Caching strategies overview
3D face reconstruction: from basic knowledge to recognition / reconstruction methods!
Fastjson parses JSON strings (deserialized to list, map)
[interpretation of the paper] machine learning technology for Cataract Classification / classification
guava:Collections. The collection created by unmodifiablexxx is not immutable
随机推荐
Torch Cookbook
50 commonly used numpy function explanations, parameters and usage examples
通过数字电视通过宽带网络取代互联网电视机顶盒应用
在Pi和Jetson nano上运行深度网络,程序被Killed
C # use Oracle stored procedure to obtain result set instance
2022菲尔兹奖揭晓!首位韩裔许埈珥上榜,四位80后得奖,乌克兰女数学家成史上唯二获奖女性
Is this the feeling of being spoiled by bytes?
Shake Sound poussera l'application indépendante de plantation d'herbe "louable", les octets ne peuvent pas oublier le petit livre rouge?
Four common ways and performance comparison of ArrayList de duplication (jmh performance analysis)
代理和反向代理
One line by line explanation of the source code of anchor free series network yolox (a total of ten articles, you can change the network at will after reading it, if you won't complain to me)
Three schemes of SVM to realize multi classification
技术分享 | 抓包分析 TCP 协议
How to implement common frameworks
Guava: three ways to create immutablexxx objects
抖音将推独立种草App“可颂”,字节忘不掉小红书?
嵌入式开发的7大原罪
Numpy download and installation
Redistemplate common collection instructions opsforhash (IV)
14年本科毕业,转行软件测试,薪资13.5K