Trusted-user information

A user can list hosts from which they can connect as a trusted user in their .rhosts file.

The .rhosts file is located in the user's home directory on the computer housing the database server. To enable the trusted user authentication, specify s=2 or s=3 in the options in the sqlhosts entry. If you do not specify an s option, s=3 is the default.

There may be reasons why a user’s .rhosts file cannot be used. For example, a non-root installation might not have read access to a specific user’s .rhosts file. You can specify an alternate filename by setting the REMOTE_USERS_CFG configuration parameter. If you set this parameter, the database server only has a single trusted-user file for all users.

Each line of the .rhosts file is a host from which the user can connect. You must specify server names both with and without domain names to avoid performing an extra DNS lookup. For example:
#trustedusers
xxx.example.com
xxx

yyy.example.com
yyy
The file specified by the REMOTE_USERS_CFG configuration parameter must be a combination of individual .rhosts files. Each single-line entry of the file has the following format:
hostname username
For example, suppose the following two .rhosts files existed for users John and Fred:
~john/.rhosts
#trustedhosts
xxx.example.com
xxx

yyy.example.com
yyy
~fred/.rhosts
#trustedhosts
xxx.example.com
xxx

zzz.example.com
zzz
John does not trust zzz.example.com or zzz, and Fred does not trust yyy.example.com or yyy.
The .rhosts files could be combined into a single file with the following format:
#trustedhost      username
xxx.example.com   john
xxx               john

yyy.example.com   john
yyy               john

xxx.example.com   fred
xxx               fred

zzz.example.com   fred
zzz               fred

Windows: A home directory is not automatically assigned when the Windows administrator creates a user identity. The administrator can add a home directory to a user's profile with the User Manager application.


Copyright© 2018 HCL Technologies Limited