Previous Page
|
Next Page
Previous Page
|
Next Page
SAS 9.2 Intelligence Platform: Security Administration Guide
Authentication Model
Introduction to the Authentication Model
Authentication to the Metadata Server
Authentication to Data Servers and Processing Servers
Authentication Scenarios
Mixed Providers
Credential Gaps
How Logins Are Used
About PUBLIC Access and Anonymous Access
Previous Page
|
Next Page
|
Top of Page
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.
Previous Page
|
Next Page
|
Top of Page