Previous Page | Next Page

Authentication Model

About PUBLIC Access and Anonymous Access

In general, only users who can authenticate and who have a well-formed user definition should use a SAS deployment. However, in order to accommodate scenarios where more general access is desired, the following specialized configurations are supported:

The following list highlights differences between PUBLIC access and anonymous access:

If you choose to offer PUBLIC or anonymous access, you risk users seeing more data and content than you might expect.

Carefully review and manage access control for the PUBLIC group. If you offer anonymous access, carefully review and manage access for your surrogate service identity too.  [cautionend]

See Also

How SAS Identity is Determined

Initial Role Memberships in a New Deployment

Previous Page | Next Page | Top of Page