Careful management of login names, passwords, and permissions is essential to the security of the replication system. Replication Server login names and specific permissions are required for:
Each component of the replication system, such as the data server and the Replication Server
Each user who is setting up replicated data or monitoring and managing the Replication Server
You can set up encrypted passwords throughout the replication system and change passwords that are encrypted. Refer to the Replication Server installation and configuration guides for your platform for details on password encryption. Also see “Enabling and disabling password encryption in sysattributes” for a brief overview of encryption capabilities.
In addition, Replication Server supports third-party security services that ensure secure message transmission over the network and enable user authentication for seamless login to Replication Servers in the replication system. See “Managing network-based security”.