Know Thyself—and Thy People

A basic security requirement is that you know your users: You must first identify users before you can determine their privileges and access rights. Users can be authenticated in a number of ways before they are allowed to create a database session, for example. In database authentication, you can define users such that the database performs both identification and authentication of users. In external authentication, you can define users such that authentication is performed by the operating system or network service. Alternatively, you can define users to be authenticated by the Secure Sockets Layer (SSL).

As the world's largest producer of hops and hops products, John I. Haas, Inc., is an acknowledged industry leader. ...

Get End of Software, The: Finding Security, Flexibility, and Profit in the On Demand Future now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.