Preview

database concepts unit 8 assignment 1

Satisfactory Essays
Open Document
Open Document
390 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
database concepts unit 8 assignment 1
PT2520 DataBase Concepts
Unit 8 Research Assignment 1

1. Find out how MySQL manages basic authentication and authorization.
In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system
Ref :http://security.widyani.com/sql-server-security/basic-microsoft-sql-server-security.html

2. Find out how Microsoft Access manages basic authentication and authorization.

Authentication

All calls to IIS Smooth Streaming Management REST Services are authenticated through the HTTP authentication mechanisms supported by IIS. IIS 7 supports Basic authentication, Client Certificate Mapping authentication, Digest authentication, IIS Client Certificate Mapping authentication, and Windows authentication (Negotiate and NTLM). (IIS 7 also supports Anonymous authentication, but Anonymous authentication is explicitly blocked for REST services APIs). All operations are authenticated. Anonymous calls are rejected with an HTTP 401 (Unauthorized) status code even when Anonymous authentication is enabled.
Non-domain and non-Windows clients can call the services if they use standard HTTP authentication mechanisms and if Windows credentials are provided. In addition, client certificate mapping can be used in order to map generic certificates to Windows user accounts. For more information,

Authorization

IIS Smooth Streaming Management REST Services authorization is performed by checking user access rights to the publishing point (.isml) file. GET operations require read access to the publishing point file. PUT or DELETE operations require write access for the files. Creating a new publishing point using the POST operation

You May Also Find These Documents Helpful

  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    2. Which of the following can an Active Directory domain controller use to verify a user's identity?…

    • 778 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. IIS is installed using port 80 for HTTP connections, which conflicts with the HTTP streaming.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Wodrich, M. (2009, November 10). Vulnerability in Web Services on Devices (WSD) API - Security Research & Defense - Site Home - TechNet Blogs. Retrieved from http://blogs.technet.com/b/srd/archive/2009/11/10/vulnerability-in-web-services-on-devices-wsd-api.aspx…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The WITH GRANT OPTION is required to allow a user to grant the specified object privileges to other users.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Idly sits around doing nothing until a client makes request to view a page. The application detects that the client has connected to the server. An event handler then allows this user to download and view the page. This wouldn’t be considered an intelligent application.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for receiving packet loss information from clients and providing synchronization information to clients that are streaming by using RTSPU.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays