Previous Page | Next Page

Authentication Model

Mixed Providers

About Mixed Providers

Solution to Mixed Providers: Use SAS Token Authentication

Solution to Mixed Providers: Align Authentication

Solution to Mixed Providers: Store User IDs and Passwords


About Mixed Providers

If the credentials with which users initially log on aren't also valid for the workspace server, access to the standard workspace server isn't seamless. For example, if you use an Active Directory account in an initial logon to a metadata server on Windows, and you attempt to access a standard workspace server on UNIX, you might be prompted for a user ID and password that are valid for the UNIX host.

Note:    In general, Web applications and SAS Information Map Studio use the pooled workspace server, not the standard workspace server. So users who use only these applications might not be affected by a mixed provider situation. See Choices in Workspace Server Pooling.  [cautionend]

In a mixed providers situation, achieving seamless access to the standard workspace server requires a trade-off between configuration effort, maintenance effort, and degree of segregation for host access from that server to SAS data. The following table outlines the choices.

Choices for Seamless Access In a Mixed Provider Scenario
Priority Recommendation
Minimize administrative effort. The preferred approach is to convert the workspace server to use SAS token authentication.

You can instead store a single shared password for the workspace server's host.1

Provide a few levels of host access with minimal administrative effort. The preferred approach is to define a few servers that use SAS token authentication. Each server runs under a different account.

You can instead store a few shared passwords for the workspace server's host.1

Preserve each user's identity. The preferred approach is to align authentication so that both servers do use the same provider.

You can instead store individual passwords for the workspace server's host.

1 The shared password is stored in a login on a group's Accounts tab. Members of a group can use that group's logins.

The following topics provide details about each approach.


Solution to Mixed Providers: Use SAS Token Authentication

If you configure the workspace server to use SAS token authentication, access is seamless because the workspace server's host operating system is no longer used to validate users. Instead, users are validated by the metadata server through a single-use SAS identity token.

In a mixed providers situation, using SAS token authentication is preferable to using a group login for these reasons:

See How to Configure SAS Token Authentication.


Solution to Mixed Providers: Align Authentication

If you can enable the metadata server and the standard workspace server to use the same provider, access is seamless through credential caching and reuse.

If the metadata server is on Windows and the workspace server is on UNIX, you might use PAM to extend the UNIX host authentication process to recognize Windows accounts. See Pluggable Authentication Modules (PAM). With this approach, the Windows credentials that users supply in their initial logon to the metadata server can be reused for authentication to the workspace server. User identity is preserved from the workspace server to the host, you don't have to store user passwords in the metadata, and access is seamless. However, this approach has these limitations:

If the metadata server is on UNIX (or z/OS) and the workspace server is on Windows, an additional alternative is to make the metadata server itself recognize Windows accounts. See Direct LDAP Authentication.

Note:   Direct LDAP isn't supported for the workspace server. The workspace server can use only some form of host authentication or SAS token authentication.  [cautionend]


Solution to Mixed Providers: Store User IDs and Passwords

If you store user or group passwords for the workspace server's host, access is seamless through credential retrieval. In this solution, you treat the workspace server as if it were a third-party server such as Oracle. See How to Store Passwords for the Workspace Server.

Previous Page | Next Page | Top of Page