Greetings,
* Dave Hughes (dhughes20@gmail.com) wrote:
> Thank you for the information! This issue originated from a Department of
> Defense STIG (Security Technical Implementation Guides). It's a security
> check that applications and databases have to go through. I'll just leave
> this one as a "finding" since there isn't a way to really configure it to
> their requirements.
I believe the PG STIG encourages using PKI instead of using passwords
for authentication.
Thanks,
Stephen