Rather than password authentication you should look at other mechanisms like SSH's public key authentication or Kerberos keytabs. What's probably better is to use a role-based access control mechanism where only processes with the requisite roles can access the secure system. -- Rich P.