This provider allows you to create a file with the a of users with hashed passwords, giving you granular access control. While certainly better than having your installation just either accept or deny everyone, this approach still has two disadvantages:
- In the case of HA installation with multiple masters, you will need to synchronize changes to the password file between all masters, which is prone to errors and inefficient. Sure, it can be automated using configuration management and the version control system (VCS), but there are very few use cases where you wouldn't want to integrate your cluster with the corporate identity management server.
- It doesn't integrate with the corporate identity management solution, which requires ...