PostgreSQL supports many client authentication methods, but in this case we’re only going to concern ourselves with two: password and md5.
PostgreSQL supports multiple client authentication methods including: trust, reject, md5, password, gss, sspi, krb5, ident, peer, ldap, radius, cert, and pam. Here we’re only going to concern ourselves with two: ident and md5.
When connecting to PostgreSQL on Linux for the first time many admins have questions, especially if those admins are from the MySQL world.
By default, when PostgreSQL is installed, a postgres user is also added.
If you run the command:
… you’ll see the postgres user.
- These instructions are intended specifically for enabling two-factor authentication for Manage users.
What is Two-factor Authentication (2FA)?
Two-factor authentication (also known as 2FA) means that instead of just a password (one factor), you will need two factors (password, plus a rotating authentication token) to login to your Manage account. Only the correct combination of the first and second factors will allow you to log in. Two-factor authentication is more secure than one-factor authentication.
Liquid Web’s around-the-clock monitoring of your server works best when we also are able to log in to your server and proactively fix issues as they pop up. If you change your server’s root or admin password without updating your account information through manage, then we only will be able to notify you of problems rather than attempting to fix them automatically.