This table provides a high-level review of support for
different authentication mechanisms. In the table, the following symbols
indicate the extent to which each server can be accessed using each
feature:
-
![full](images/circlefull.png)
Supported
-
![half](images/circlehalf.png)
Supported for only direct connections (not metadata
aware connections)
-
![slice](images/circlepie.png)
Intended for only administrators and some service
identities
-
![dot](images/circledot.png)
Used only for certain server-to-server communications
-
![empty](images/circleempty.png)
Not supported
Summary: How Servers Can Be Accessed
|
|
|
|
|
Stored Process or Pooled
Workspace
|
|
Host authentication
(credentials)
|
|
|
|
|
|
Integrated Windows authentication
|
|
|
|
|
|
|
|
|
|
|
|
Direct LDAP authentication
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1For the client-pooled workspace
server, user access depends on membership in a puddle group.
|