"In computer security, the process of determining who the user claims to be and whether that claim is correct." (Bill Pribyl & Steven Feuerstein, "Learning Oracle PL/SQL", 2001)
"The step of determining the identity of the requesting client. Single-factor authentication usually is based on a simple password and is the least secure authentication scheme. Two-factor authentication may involve What-You-Know (a password) with What-You-Possess (a plastic card) and is secure enough for banks’ automated teller machines." (Ralph Kimball & Margy Ross, "The Data Warehouse Toolkit" 2nd Ed., 2002)
"A process that occurs as users attempt to log on to SQL Server 2000. This process verifies that the users are permitted to log on by checking their identity against a database of security accounts. There are two methods of authentication in SQL Server 2000 - Mixed Mode authentication and Windows Authentication. Windows Authentication is recommended for all cases where all SQL Server 2000 users have the ability to log on initially in a Windows environment." (Anthony Sequeira & Brian Alderman, "The SQL Server 2000 Book", 2003)
"A challenge/response mechanism that ensures that a user connecting to SQL Server is authorized to do so." (Marilyn Miller-White et al, "MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance 70-444", 2007)
"Verification of the user identity." (MongoDb, "Glossary", 2008)
"The process of validating that the user attempting to connect to Reporting Server is authorized to do so." (Jim Joseph et al, "Microsoft® SQL Server™ 2008 Reporting Services Unleashed", 2009)
"The process through which a DBMS verifies that only registered users are able to access the database." (Carlos Coronel et al, "Database Systems: Design, Implementation, and Management" 9th Ed., 2011)
"The process of confirming a user’s or computer’s identity." (Craig S Mullins, "Database Administration", 2012)
"The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords." (Microsoft, "SQL Server 2012 Glossary", 2012)
"The process by which a system verifies a user's identity. User authentication is completed by a security facility outside the DB2 database system, often part of the operating system or a separate product." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)
"The process by which a user presents credentials to the database, which verifies the credentials and allows access to the database." (Oracle)
No comments:
Post a Comment