Database authentication methods
SunSystems can be configured to use different authentication methods as explained below, however database security is always based on Windows authentication.
Authentication Settings
Consequently, for any implementation other than a standalone installation, a domain is required, which allows servers and clients to correctly authenticate with the database server.
Note: For information on security settings
in DeployManager, see the Multitier Installation Guide for
SunSystems.
Note: A SunSystems user is always required before accessing SunSystems functions, and all internal security
access constraints are based on this account.
Authentication Method | Features |
---|---|
Standard | Basic level of security. SunSystems Security maintains users and associated passwords. |
Windows | Windows credentials entered during operating system sign-in are passed straight through to SunSystems. These are mapped to a specific SunSystems User to determine the identity of the user submitting the login request. The SunSystems User never sees a login dialogue. |
LDAP complaint Directory Service | An LDAP compliant directory service is used to authenticate login request. These are mapped to a specific SunSystems User to determine the identity of the login requesterSunSystems |
It is possible to mix the authentication methods described above. If a Windows mapping is found, this will always take precedence.