Skip to content
Merged
Show file tree
Hide file tree
Changes from 7 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions best-practices-for-security-configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,8 @@ To avoid this risk, it is recommended to set a root password during deployment:
- For deployments using TiUP, refer to [Deploy TiDB Cluster Using TiUP](/production-deployment-using-tiup.md#step-7-start-a-tidb-cluster) to generate a random password for the root user.
- For deployments using TiDB Operator, refer to [Set initial account and password](https://docs.pingcap.com/tidb-in-kubernetes/stable/initialize-a-cluster#set-initial-account-and-password) to set the root password.

You can also use the [`--initialize-secure`](/command-line-flags-for-tidb-configuration.md#--initialize-secure) option to restrict network access for the initial root user.

## Enable password complexity checks

By default, TiDB does not enforce password complexity policies, which might lead to the use of weak or empty passwords, increasing security risks.
Expand Down
2 changes: 1 addition & 1 deletion command-line-flags-for-tidb-configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ When you start the TiDB cluster, you can use command-line options or environment

## `--initialize-secure`

- Bootstraps tidb-server in secure mode
- Controls whether to create a `root` account using the `auth_socket` authentication method during tidb-server initialization. If it is set to `true`, when connecting to TiDB for the first time, you must use a socket connection, which provides stronger security.
- Default: `false`

## `--initialize-sql-file`
Expand Down
Loading