The solution was to create something called a shadow password.
解决的方法是创建shadow password。
It also provides shadow password support to enhance system security.
为了增强系统安全性它还支持影子口令。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
Password file-base authentication: authentication is based on the password and shadow files or interaction with Network Information System (NIS), on the machine where the database server is installed.
基于密码文件的身份验证:身份验证基于安装数据库服务器的机器上的密码和影子文件,或者与Net workInformationSystem (NIS)的交互。
Note that as the password entry is not readable, the only use of the shadow attributes is to manage password expiration.
注意密码条目是不可读的,shadow属性的惟一用处就是管理密码的过期问题。
Migrate the password and shadow information.
迁移密码和shadow信息。
Migrate the password and shadow information.
迁移密码和shadow信息。
应用推荐