Authentication
Users can connect to a central server using these authentication methods:
- Password
- GSSAPI
- SSPI
- Kerberos
- LDAP
- RADIUS
- PAM
- SSL Certificate
This authentication information is contained on central servers hosted in a secure data centre environment and is never propagated to an edge server.
Individual users can be allowed/denied login access as and when required.

Roles
Uses can be granted zero, one or more roles to permit them particular management abilities and/or query access to particular database objects and/or regions of the network.

Comments
Article is closed for comments.