Security policy

Authentication Settings

Note: For information on security settings in DeployManager, see the Multitier Installation Guide for SunSystems 6.3 on https://www.inforxtreme.com/allogin/allogin.aspx

SunSystems can be configured to use different authentication methods as explained below, however database security is always based on Windows authentication. Consequently, for any implementation other than a standalone installation, a domain is required, which allows servers and clients to correctly authenticate with the database server.

Note: A SunSystems user is always required before accessing SunSystems functions, and all internal security access constraints are based on this account.
Authentication Method Features
Standard Basic level of security. SunSystems Security maintains users and associated passwords.
Windows Windows credentials entered during operating system sign-in are passed straight through to SunSystems. These are mapped to a specific SunSystems User to determine the identity of the user submitting the login request. The SunSystems User never sees a login dialogue.
LDAP complaint Directory Service An LDAP compliant directory service is used to authenticate login request. These are mapped to a specific SunSystems User to determine the identity of the login requesterSunSystems

It is possible to mix the authentication methods described above. If a Windows mapping is found, this will always take precedence.