You can enhance the security for large, heterogeneous applications by authenticating logins with a central repository. Adaptive Server supports a variety of external authentication methods:
Kerberos – A security mechanism available with Network-Based Security. Kerberos provides a centralized and secure authentication mechanism in enterprise environments that employ the Kerberos infrastructure. Authentication occurs with a trusted, third-party server called a Key Distribution Center (KDC) that verifies both the client and the server.
LDAP User Authentication – Lightweight Directory Access Protocol (LDAP) provides a centralized authentication mechanism based on a user’s login name and password.
PAM User Authentication – Pluggable Authentication Module (PAM) provides a centralized authentication mechanism that uses interfaces provided by the operating system for administration and runtime application interfaces.
Copyright © 2005. Sybase Inc. All rights reserved. |