Previous Page | Next Page

Authentication Model

Introduction to the Authentication Model

There is no single mechanism that is applicable for all authentication events throughout a typical deployment. Instead, each deployment uses some combination of authentication processes, trust relationships, and single sign-on technologies. This helps to balance a range of goals such as these:

This chapter provides an in-depth understanding of authentication and security aspects of SAS server configuration. For basic information about authentication, see Facilitate Authentication.

Previous Page | Next Page | Top of Page