Greetings,

* Dave Hughes (dhughe...@gmail.com) wrote:
> Thank you for the information!  This issue originated from a Department of
> Defense STIG (Security Technical Implementation Guides).  It's a security
> check that applications and databases have to go through.  I'll just leave
> this one as a "finding" since there isn't a way to really configure it to
> their requirements.

I believe the PG STIG encourages using PKI instead of using passwords
for authentication.

Thanks,

Stephen

Attachment: signature.asc
Description: PGP signature

Reply via email to