When accessing a database, authentication must always be performed in order to prevent tampering or information leakage from spoofing by a malicious user.
Password authentication is used when logging on to a database, and the account and password used for authentication are to be strictly managed by administrators.
Additionally, authentication must also be implemented reliably for connections to a database from clients, so that only permitted users can access the database.