当前位置:网站首页>Database postragesq peer authentication
Database postragesq peer authentication
2022-07-05 01:13:00 【wx5d0241bb88268】
20.9. Peer authentication
Peer The authentication method obtains the operating system user name of the client from the kernel and uses it as the allowed database user name ( And optional user name mapping ) Come to work . This method only supports... On local connections .
The following supported configuration options are used for peer:
map
Allow mapping between system and database user names . See Section 20.2.Peer Certification is only available getpeereid() function 、SO_PEERCRED Socket parameters or similar mechanisms are available on the operating system . these OS The present includes Linux、 Most of BSD Include OS X as well as Solaris.
边栏推荐
- [untitled]
- [wave modeling 3] three dimensional random real wave modeling and wave generator modeling matlab simulation
- [wave modeling 2] three dimensional wave modeling and wave generator modeling matlab simulation
- Summary of the function and usage of const, volatile and restrict
- Ruby tutorial
- Inventory of more than 17 typical security incidents in January 2022
- 资深测试/开发程序员写下无bug?资历(枷锁)不要惧怕错误......
- Global and Chinese market of veterinary thermometers 2022-2028: Research Report on technology, participants, trends, market size and share
- Postman automatically fills headers
- 微信小程序;胡言乱语生成器
猜你喜欢
【大型电商项目开发】性能压测-优化-中间件对性能的影响-40
抓包整理外篇——————状态栏[ 四]
Yyds dry goods inventory kubernetes management business configuration methods? (08)
Redis master-slave replication cluster and recovery ideas for abnormal data loss # yyds dry goods inventory #
SAP UI5 应用的主-从-从(Master-Detail-Detail)布局模式的实现步骤
Single step debugging of master data reading of SAP commerce cloud products
那些一门心思研究自动化测试的人,最后都怎样了?
Inventory of more than 17 typical security incidents in January 2022
Arbitrum: two-dimensional cost
【海浪建模3】三维随机真实海浪建模以及海浪发电机建模matlab仿真
随机推荐
Discrete mathematics: propositional symbolization of predicate logic
What happened to those who focused on automated testing?
实战模拟│JWT 登录认证
华为百万聘请数据治理专家!背后的千亿市场值得关注
【大型电商项目开发】性能压测-优化-中间件对性能的影响-40
Inventory of more than 17 typical security incidents in January 2022
Summary of the function and usage of const, volatile and restrict
Are you still writing the TS type code
Call Huawei order service to verify the purchase token interface and return connection reset
Playwright之录制
LeetCode周赛 + AcWing周赛(T4/T3)分析对比
Global and Chinese market of portable CNC cutting machines 2022-2028: Research Report on technology, participants, trends, market size and share
Arbitrum: two-dimensional cost
Implementation steps of master detail detail layout mode of SAP ui5 application
视频网站手绘
[development of large e-commerce projects] performance pressure test - Performance Monitoring - heap memory and garbage collection -39
Mongodb series learning notes tutorial summary
程序员SQL数据脚本编码能力弱,BI做不出来怎么办?
6. Scala operator
有哪些收益稳定的理财产品,这两个都不错