Overview

Careful management of login names, passwords, and permissions is essential to the security of the replication system. Replication Server login names and specific permissions are required for:

You can set up encrypted passwords throughout the replication system and change passwords that are encrypted. Refer to the Replication Server installation and configuration guides for your platform for details on password encryption. Also see “Enabling and disabling password encryption in sysattributes” for a brief overview of encryption capabilities.

In addition, Replication Server supports third-party security services that ensure secure message transmission over the network and enable user authentication for seamless login to Replication Servers in the replication system. See “Managing network-based security”.