The method, principle, and form of postgresql client verification are similar to the *** host *** of Linux :-
PostgreSQL will find the first record that matches the connection type for verification. If verification fails, verify the next or special action. Everyone is equal!
After the configuration file is modified: You can use pg_ctl reload to reload and make it take effect!
The configuration file for pg_cmd.conf is relatively simple. One record is a row and seven specific forms are commonly used as a host.
Host database user IP mask mothed [method option]-- Database and user can be separated by commas (,). @ filename can be used to include separate database and user lists.
- Linkage connection type: Unix sock, TCP/IP
- Two types of TCP/IP configuration: IP mask, IP/CIDR-ADDRESS (shield code)
- Two types of TCP/IP Length Standards: IPv4 and IPv6
- Two types of TCP/IP encryption: SSL and nossl
Multiple verification methods
- Trust
- Reject
- MD5
- Password
- ....