Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 6. Identification and Authentica... > Proxy Authentication Alternatives

Proxy Authentication Alternatives

The previous architecture works in many cases, but there are situations when proxy authentication can’t be used. From a security perspective, proxy authentication is ideal because database security can be fully exploited with little or no application coding. Login triggers fire, database privileges and roles are automatically enabled, and auditing can be used to track the end user’s actions.

If proxy authentication can’t be used (both the proxy authentication requests and the EUS authentication introduce latency), the application must include directions for the database so that database security can also be used. This can be done by passing user information to the database prior to performing any database-related work within the application.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint