Security policy
Authentication Settings
Note: For information on security settings in DeployManager, see the Multitier
Installation Guide for SunSystems 6.3 on https://www.inforxtreme.com/allogin/allogin.aspx
SunSystems can be configured to use different authentication methods as explained below, however database security is always based on Windows authentication. Consequently, for any implementation other than a standalone installation, a domain is required, which allows servers and clients to correctly authenticate with the database server.
Note: A SunSystems user is always required before accessing SunSystems functions, and all internal security access constraints are based on this account.
Authentication Method | Features |
---|---|
Standard | Basic level of security. SunSystems Security maintains users and associated passwords. |
Windows | Windows credentials entered during operating system sign-in are passed straight through to SunSystems. These are mapped to a specific SunSystems User to determine the identity of the user submitting the login request. The SunSystems User never sees a login dialogue. |
LDAP complaint Directory Service | An LDAP compliant directory service is used to authenticate login request. These are mapped to a specific SunSystems User to determine the identity of the login requesterSunSystems |
It is possible to mix the authentication methods described above. If a Windows mapping is found, this will always take precedence.