Preview

database concepts unit 8 assignment 1

Satisfactory Essays
Open Document
Open Document
390 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
database concepts unit 8 assignment 1
PT2520 DataBase Concepts
Unit 8 Research Assignment 1

1. Find out how MySQL manages basic authentication and authorization.
In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system
Ref :http://security.widyani.com/sql-server-security/basic-microsoft-sql-server-security.html

2. Find out how Microsoft Access manages basic authentication and authorization.

Authentication

All calls to IIS Smooth Streaming Management REST Services are authenticated through the HTTP authentication mechanisms supported by IIS. IIS 7 supports Basic authentication, Client Certificate Mapping authentication, Digest authentication, IIS Client Certificate Mapping authentication, and Windows authentication (Negotiate and NTLM). (IIS 7 also supports Anonymous authentication, but Anonymous authentication is explicitly blocked for REST services APIs). All operations are authenticated. Anonymous calls are rejected with an HTTP 401 (Unauthorized) status code even when Anonymous authentication is enabled.
Non-domain and non-Windows clients can call the services if they use standard HTTP authentication mechanisms and if Windows credentials are provided. In addition, client certificate mapping can be used in order to map generic certificates to Windows user accounts. For more information,

Authorization

IIS Smooth Streaming Management REST Services authorization is performed by checking user access rights to the publishing point (.isml) file. GET operations require read access to the publishing point file. PUT or DELETE operations require write access for the files. Creating a new publishing point using the POST operation

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for receiving packet loss information from clients and providing synchronization information to clients that are streaming by using RTSPU.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. IIS is installed using port 80 for HTTP connections, which conflicts with the HTTP streaming.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What directory enables you to use a web site to publish files located anywhere on the network?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The WITH GRANT OPTION is required to allow a user to grant the specified object privileges to other users.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wodrich, M. (2009, November 10). Vulnerability in Web Services on Devices (WSD) API - Security Research & Defense - Site Home - TechNet Blogs. Retrieved from http://blogs.technet.com/b/srd/archive/2009/11/10/vulnerability-in-web-services-on-devices-wsd-api.aspx…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Idly sits around doing nothing until a client makes request to view a page. The application detects that the client has connected to the server. An event handler then allows this user to download and view the page. This wouldn’t be considered an intelligent application.…

    • 532 Words
    • 3 Pages
    Good Essays