When operating in Integrated mode, Adaptive Server uses NT-based authentication mechanisms for all connections by:
Allowing only trusted connections, using Named Pipes, to connect to Adaptive Server
Ignoring any Adaptive Server login name and password that is submitted in the login request. Instead, it checks the mapped NT network user name against the information in the syslogins table.
If no matching login name exists, and the login process includes a default user name, Adaptive Server substitutes the default login name, for example, “guest”, to complete the connection. For more information, see “Default login”.
Providing authorized users, when they log in, with permissions and roles as described in “Permitting trusted connections”.
Following the NT Domain structure for the use of computers. NT must authenticate each user, either through trust relationships or through explicitly assigned permissions on each server.
If you bypass the NT login security for Adaptive Server authentication, that is, if you opt for Adaptive Server security only, it does not matter to which user or group you assign the computers. The only requirement is that the protocol you use allows the client and server to communicate.