Password file authentication#
Trino can be configured to enable frontend password authentication over HTTPS for clients, such as the CLI, or the JDBC and ODBC drivers. The username and password are validated against usernames and passwords stored in a file.
Password file authentication is very similar to LDAP authentication. Please see the LDAP documentation for generic instructions on configuring the server and clients to use TLS and authenticate with a username and password.
Password authenticator configuration#
To enable password file authentication, set the password authentication
In addition, create a
etc/password-authenticator.properties file on the
coordinator with the
file authenticator name:
The following configuration properties are available:
Path of the password file.
How often to reload the password file.
Max number of cached authenticated passwords.
The password file contains a list of usernames and passwords, one per line, separated by a colon. Passwords must be securely hashed using bcrypt or PBKDF2.
bcrypt passwords start with
$2y$ and must use a minimum cost of
PBKDF2 passwords are composed of the iteration count, followed by the hex encoded salt and hash:
Creating a password file#
Create an empty password file to get started:
Add or update the password for the user
htpasswd -B -C 10 password.db test