Authentication Model |
There is no single mechanism that is applicable for all authentication events throughout a typical deployment. Instead, each deployment uses some combination of authentication processes, trust relationships, and single sign-on technologies. This helps to balance a range of goals such as these:
preserve individual identity
minimize security exposures
provide a unified user experience
minimize set up and maintenance efforts
provide access to disparate systems within an environment
integrate into a wide variety of general computing environments
This chapter provides an in-depth understanding of authentication and security aspects of SAS server configuration. For basic information about authentication, see Facilitate Authentication.
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.