Vertica Blog

Vertica Blog

#authentication

Quick Tip on a blue enter key on a keyboard

Using Fall Through Authentication

If a user tries to login using their credentials and the authentication fails, the user cannot login using other authentication methods. A simple example could be a user who was configured with hash authentication. Later, TLS authentication was introduced and granted to all users or in other words granted to the PUBLIC with higher priority....