![]() |
![]() |
Authentication Mechanisms |
This table provides a high-level review of support for different authentication mechanisms. In the table, the following symbols indicate the extent to which each server can be accessed using each feature:
| |
| |
| |
| |
|
Mechanism | Server Type | ||||
---|---|---|---|---|---|
Metadata | Workspace | OLAP | Stored Process or Pooled Workspace | Client-Pooled Workspace | |
Host
authentication (credential-based) |
![]() |
![]() |
![]() |
![]() |
![]() |
Integrated
Windows authentication |
![]() |
![]() |
![]() |
![]() |
![]() |
Web
authentication |
![]() |
![]() |
![]() |
![]() |
![]() |
Direct LDAP authentication |
![]() |
![]() |
![]() |
![]() |
![]() |
Internal authentication |
![]() |
![]() |
![]() |
![]() |
![]() |
SAS token authentication |
![]() |
![]() |
![]() |
![]() |
![]() |
Trusted
user |
![]() |
![]() |
![]() |
![]() |
![]() |
Trusted
peer |
![]() |
![]() |
![]() |
![]() |
![]() |
1 For the client-pooled workspace server, user access depends on membership in a puddle group. |
![]() |
![]() |
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.