Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions best-practices-for-security-configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,8 @@ To avoid this risk, it is recommended to set a root password during deployment:
- For deployments using TiUP, refer to [Deploy TiDB Cluster Using TiUP](/production-deployment-using-tiup.md#step-7-start-a-tidb-cluster) to generate a random password for the root user.
- For deployments using TiDB Operator, refer to [Set initial account and password](https://docs.pingcap.com/tidb-in-kubernetes/stable/initialize-a-cluster#set-initial-account-and-password) to set the root password.

You can also use the [`--initialize-secure`](/command-line-flags-for-tidb-configuration.md#--initialize-secure) option to restrict network access for the initial root user.

## Enable password complexity checks

By default, TiDB does not enforce password complexity policies, which might lead to the use of weak or empty passwords, increasing security risks.
Expand Down
2 changes: 1 addition & 1 deletion command-line-flags-for-tidb-configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ When you start the TiDB cluster, you can use command-line options or environment

## `--initialize-secure`

- Bootstraps tidb-server in secure mode
- Controls whether to create a `root` account using the `auth_socket` authentication method during tidb-server initialization. If it is set to `true`, when connecting to TiDB for the first time, you must use a socket connection, which provides stronger security.
- Default: `false`

## `--initialize-sql-file`
Expand Down