When operating in Integrated mode, Adaptive Server uses Windows-based authentication mechanisms for all connections by:
Allowing only trusted connections, using Named Pipes, to connect to Adaptive Server
Ignoring any Adaptive Server login name and password that is submitted in the login request. Instead, it checks the mapped Windows network user name against the information in the syslogins table.
If no matching login name exists, and the login process includes a default user name, Adaptive Server substitutes the default login name, for example, “guest”, to complete the connection. For more information, see “Default login”.
Providing authorized users, when they log in, with permissions and roles as described in “Permitting trusted connections”.
Following the Windows Domain structure for the use of computers. Windows must authenticate each user, either through trust relationships or through explicitly assigned permissions on each server.
If you bypass the Windows login security for Adaptive
Server authentication, that is, if you opt for Adaptive Server security
only, it does not matter to which user or group you assign the computers.
The only requirement is that the protocol you use allows the client
and server to communicate.