O'Reilly logo

SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond by Tom Carpenter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Authentication

You use authentication every day of your life. When you are at a seminar or training event and the speaker says he is an expert on the topic of his speech, you use authentication mechanisms to verify this information. You listen to the information he delivers and use it to determine if he is truly an expert. You practice authentication in casual interactions too. For example, suppose someone walked up to you and said, "Hi, my name is Susan and I am tall." You would look at her and compare her height with a height you consider to be tall and authenticate whether she is truly tall or not. If she is not tall, by your standards, she will lose credibility with you.

Remember the word credentials? Consider other important ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required