Trusted-user information

A user can list hosts from which they can connect as a trusted user in their .rhosts file.

The .rhosts file is located in the user's home directory on the computer housing the database server. To enable the trusted user authentication, specify s=2 or s=3 in the options in the sqlhosts entry. If you do not specify an s option, s=3 is the default.

There may be reasons why a user’s .rhosts file cannot be used. For example, a non-root installation might not have read access to a specific user’s .rhosts file. You can specify an alternate filename by setting the REMOTE_USERS_CFG configuration parameter. If you set this parameter, the database server only has a single trusted-user file for all users.

Each line of the .rhosts file is a host from which the user can connect. You must specify server names both with and without domain names to avoid performing an extra DNS lookup. For example:
The file specified by the REMOTE_USERS_CFG configuration parameter must be a combination of individual .rhosts files. Each single-line entry of the file has the following format:
hostname username
For example, suppose the following two .rhosts files existed for users John and Fred:
John does not trust or zzz, and Fred does not trust or yyy.
The .rhosts files could be combined into a single file with the following format:
#trustedhost      username   john
xxx               john   john
yyy               john   fred
xxx               fred   fred
zzz               fred

Windows: A home directory is not automatically assigned when the Windows administrator creates a user identity. The administrator can add a home directory to a user's profile with the User Manager application.

Copyright© 2018 HCL Technologies Limited