Hash Authentication
Vertica provides a hash authentication method that allows you to use the MD5 algorithm or the more secure algorithm, SHA-512, to store user passwords. SHA-512 is one of the industry-standard SHA-2 family of hash algorithms that address weaknesses in SHA-1 and MD5. For information on creating passwords to be hashed during authentication see Passwords
Vertica strongly recommends that you use SHA-512 for hash authentication because it is more secure than MD5.
Before you perform hash authentication, review the following topics:
- Hash Authentication Parameters: Describes the two hash authentication parameters that specify which hashing algorithm to use.
- Configuring Hash Authentication: After you decide to implement hash authentication in your database, follow the steps described in this topic.