Vertica uses several approaches to manage data access, including client authentication, server authentication, and user authentication. For more information, see Security and Authentication in the Vertica documentation.
How Client Authentication Works
When a user or client application connects to the Vertica database server, they supply a unique user name and a means of authentication, such as a password or security certificate. For more information, see Client Authentication in the Vertica documentation.
Types of Client Authentication
The database server uses client authentication to establish the identity of the requesting client and determines whether that client is authorized to connect to the Vertica server using the supplied credentials.
Client-server authentication methods define how clients connect to a Vertica server.
Vertica uses Secure Socket Layer (SSL) and Transport Layer Security (TLS) to establish a secure connection between the client machine and the server. For more information, see Implementing Client Authentication.
Read more about security in the Vertica core documentation. Or browse our blogs: