Hash Authentication
Vertica provides a hash authentication method that allows you to use the MD5 algorithm or the more secure algorithm, SHA-512, to store user passwords. SHA-512 is one of the industry-standard SHA-2 family of hash algorithms that address weaknesses in SHA-1 and MD5. For information on creating passwords to be hashed during authentication see Passwords
Vertica strongly recommends that you use SHA-512 for hash authentication because it is more secure than MD5.
Before you perform hash authentication, review the following topics:
- Hash Authentication Parameters—Describes the two hash authentication parameters that specify which hashing algorithm to use.
- Upgrade Considerations for Hash Authentication—Before you implement the SHA-512 algorithm for one or more users, you must be aware of several issues. For details, review this topic before proceeding.
- How to Configure Hash Authentication—After you decide to implement hash authentication in your database, follow the steps described in this topic..