O'Reilly logo

QlikView Server and Publisher by Stephen Redmond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Alternative Authentication and Authorization Methods

What is the difference between authentication and authorization? When you log into your PC, your user credentials are checked against a user database (the local user database, Active Directory, LDAP, or other system), and you are let through to your desktop—this is authentication. When you try and open a file, the file system checks to see if you have the rights to open that file—this is authorization. You can see that authorization requires authentication to happen first, because authentication identifies the user who needs to be authorized.

We have already seen how we log into QlikView's AccessPoint with Active Directory/NTLM authentication, by allowing the credentials to be either ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required