Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. Database
  4. A Quick SQL/Integrated Authentication issue (Looks like I am missing something trivial)

A Quick SQL/Integrated Authentication issue (Looks like I am missing something trivial)

Scheduled Pinned Locked Moved Database
securitydatabasecomhelpquestion
18 Posts 5 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J J4amieC

    Mycroft Holmes wrote:

    almost no one uses it. The normal design is for the application to have a SQL userid/password that is authorised to access the parts of the database required

    :wtf: You think SQL authentication is preferable to Windows Authentication in a production environment? Or did I misunderstand?

    M Offline
    M Offline
    Mycroft Holmes
    wrote on last edited by
    #8

    Nope you did not misunderstand, in over 20 years of database development I have only twice seen windows authentication used and they were both small organisations.

    Never underestimate the power of human stupidity RAH

    J 1 Reply Last reply
    0
    • M Mycroft Holmes

      Nope you did not misunderstand, in over 20 years of database development I have only twice seen windows authentication used and they were both small organisations.

      Never underestimate the power of human stupidity RAH

      J Offline
      J Offline
      J4amieC
      wrote on last edited by
      #9

      Ok, I have an even smaller sample size than you, but in 15 years of SQL/web development i have only once seen SQL authenttication used. The wisdom passed to be by my elders was that windows authentication could be kept significantly more secure, primarily by centralising policies across (potentially) multiple instance of sql server. Almost everywhere ive ever worked has specifically not installed sql with mixed mode security, making the use of sql authentication actually impossible. Edit: this article seems to backup my claims above: http://databases.about.com/od/sqlserver/a/authentication.htm[^]

      "Microsoft’s best practice recommendation is that you use Windows authentication mode whenever possible. The main benefit is that the use of this mode allows you to centralize account administration for your entire enterprise in a single place: Active Directory. This dramatically reduces the chances of error or oversight.

      For example, consider the scenario where a trusted database administrator leaves your organization on unfriendly terms. If you use Windows authentication mode, revoking that user’s access takes place automatically when you disable or remove the DBA’s Active Directory account. If you use mixed authentication mode, you not only need to disable the DBA’s Windows account, but you also need to comb through the local user listings on each database server to ensure that no local accounts exist where the DBA may know the password. That’s a lot of work! "

      Edit2: The general wisdom seems to be that if you support multiple platforms connecting to SQL, then SQL Authentication is your only option. If all clients are on a windows domain, use windows auth. (source: http://blogs.msdn.com/b/jjameson/archive/2007/03/23/sql-server-authentication-modes.aspx[^]). Its certainly got nothing to do with company size or programmer experience!

      M 1 Reply Last reply
      0
      • V Vasudevan Deepak Kumar

        Dear Pete, The Virtual Directory has 'Anonymous Authentication' disabled. It is a Windows Server 2008 R2. The virtual directory has only Windows Authentication enabled.

        Vasudevan Deepak Kumar Personal Homepage
        Tech Gossips
        The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

        J Offline
        J Offline
        J4amieC
        wrote on last edited by
        #10

        As Pete said, this is the identity of the AppDomain. Its got nothing to do with the authentication mode of the website or virtual directory.

        1 Reply Last reply
        0
        • J J4amieC

          Ok, I have an even smaller sample size than you, but in 15 years of SQL/web development i have only once seen SQL authenttication used. The wisdom passed to be by my elders was that windows authentication could be kept significantly more secure, primarily by centralising policies across (potentially) multiple instance of sql server. Almost everywhere ive ever worked has specifically not installed sql with mixed mode security, making the use of sql authentication actually impossible. Edit: this article seems to backup my claims above: http://databases.about.com/od/sqlserver/a/authentication.htm[^]

          "Microsoft’s best practice recommendation is that you use Windows authentication mode whenever possible. The main benefit is that the use of this mode allows you to centralize account administration for your entire enterprise in a single place: Active Directory. This dramatically reduces the chances of error or oversight.

          For example, consider the scenario where a trusted database administrator leaves your organization on unfriendly terms. If you use Windows authentication mode, revoking that user’s access takes place automatically when you disable or remove the DBA’s Active Directory account. If you use mixed authentication mode, you not only need to disable the DBA’s Windows account, but you also need to comb through the local user listings on each database server to ensure that no local accounts exist where the DBA may know the password. That’s a lot of work! "

          Edit2: The general wisdom seems to be that if you support multiple platforms connecting to SQL, then SQL Authentication is your only option. If all clients are on a windows domain, use windows auth. (source: http://blogs.msdn.com/b/jjameson/archive/2007/03/23/sql-server-authentication-modes.aspx[^]). Its certainly got nothing to do with company size or programmer experience!

          M Offline
          M Offline
          Mycroft Holmes
          wrote on last edited by
          #11

          Your arguments are perfectly valid right up until they meet the inertia of outsourced support where it can take 2 weeks to get a new user group creaded in AD. You need 15 pages of forms and 2 interviews to justify the group. I need to respond to user requirements in hour (or quicker) not in days/weeks. And yeah I seen a multipage exit document signoff.

          Never underestimate the power of human stupidity RAH

          J 1 Reply Last reply
          0
          • M Mycroft Holmes

            Your arguments are perfectly valid right up until they meet the inertia of outsourced support where it can take 2 weeks to get a new user group creaded in AD. You need 15 pages of forms and 2 interviews to justify the group. I need to respond to user requirements in hour (or quicker) not in days/weeks. And yeah I seen a multipage exit document signoff.

            Never underestimate the power of human stupidity RAH

            J Offline
            J Offline
            J4amieC
            wrote on last edited by
            #12

            So its basically your very specific situation which precludes you using the prefered method of security. This is totally different from what you originally said: almost no one uses it and test/toy application use integrated security

            M 1 Reply Last reply
            0
            • L Lost User

              Is impersonation enabled?

              V Offline
              V Offline
              Vasudevan Deepak Kumar
              wrote on last edited by
              #13

              Yes. I did went through all those procedures.

              Vasudevan Deepak Kumar Personal Homepage
              Tech Gossips
              The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

              1 Reply Last reply
              0
              • J J4amieC

                So its basically your very specific situation which precludes you using the prefered method of security. This is totally different from what you originally said: almost no one uses it and test/toy application use integrated security

                M Offline
                M Offline
                Mycroft Holmes
                wrote on last edited by
                #14

                Nope I tend to work for large organisations that have a huge amount of inertia. While integrated may be the preferred method I have never seen it implemented in a large organisatrion.

                J4amieC wrote:

                very specific situation

                I just finished arguing with IT so my example may have been a little narrow :(

                Never underestimate the power of human stupidity RAH

                1 Reply Last reply
                0
                • M Mycroft Holmes

                  There is a reason you rarely see question about integrated security in a database forum, almost no one uses it. The normal design is for the application to have a SQL userid/password that is authorised to access the parts of the database required. I have never seen anything but a test/toy application use integrated security.

                  Never underestimate the power of human stupidity RAH

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #15

                  Mycroft Holmes wrote:

                  There is a reason you rarely see question about integrated security in a database forum, almost no one uses it

                  In that case I've been a nobody for over a decade. I don't like adding passwords to authenticate a user that's already logged in.

                  Mycroft Holmes wrote:

                  I have never seen anything but a test/toy application use integrated security.

                  "Therefore, it doesn't exist?" :D

                  Bastard Programmer from Hell :suss:

                  M 1 Reply Last reply
                  0
                  • L Lost User

                    Mycroft Holmes wrote:

                    There is a reason you rarely see question about integrated security in a database forum, almost no one uses it

                    In that case I've been a nobody for over a decade. I don't like adding passwords to authenticate a user that's already logged in.

                    Mycroft Holmes wrote:

                    I have never seen anything but a test/toy application use integrated security.

                    "Therefore, it doesn't exist?" :D

                    Bastard Programmer from Hell :suss:

                    M Offline
                    M Offline
                    Mycroft Holmes
                    wrote on last edited by
                    #16

                    Eddy Vluggen wrote:

                    I don't like adding passwords to authenticate a user that's already logged in.

                    Why on earth would you need to do that. I have the user log in using active directories for authentication, then use those details to get the application specific authorisation. Meanwhile the application logs onto the database using a SQL userid/password (actually the WCF service logs onto the databse).

                    Eddy Vluggen wrote:

                    Therefore, it doesn't exist

                    Nah probably just not commonly used! Actually that might be an interesting survey.

                    Never underestimate the power of human stupidity RAH

                    L 1 Reply Last reply
                    0
                    • M Mycroft Holmes

                      Eddy Vluggen wrote:

                      I don't like adding passwords to authenticate a user that's already logged in.

                      Why on earth would you need to do that. I have the user log in using active directories for authentication, then use those details to get the application specific authorisation. Meanwhile the application logs onto the database using a SQL userid/password (actually the WCF service logs onto the databse).

                      Eddy Vluggen wrote:

                      Therefore, it doesn't exist

                      Nah probably just not commonly used! Actually that might be an interesting survey.

                      Never underestimate the power of human stupidity RAH

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #17

                      Mycroft Holmes wrote:

                      Why on earth would you need to do that

                      Your users need access to an additional secret (the sql username/password). I'd say they're already logged in to the system. Where do you keep the secret? Your app needs access to it, so it's entered by the user or it's stored somewhere.

                      Mycroft Holmes wrote:

                      Nah probably just not commonly used!

                      That doesn't make it a bad idea :)

                      Mycroft Holmes wrote:

                      Actually that might be an interesting survey.

                      True :thumbsup:

                      Bastard Programmer from Hell :suss:

                      M 1 Reply Last reply
                      0
                      • L Lost User

                        Mycroft Holmes wrote:

                        Why on earth would you need to do that

                        Your users need access to an additional secret (the sql username/password). I'd say they're already logged in to the system. Where do you keep the secret? Your app needs access to it, so it's entered by the user or it's stored somewhere.

                        Mycroft Holmes wrote:

                        Nah probably just not commonly used!

                        That doesn't make it a bad idea :)

                        Mycroft Holmes wrote:

                        Actually that might be an interesting survey.

                        True :thumbsup:

                        Bastard Programmer from Hell :suss:

                        M Offline
                        M Offline
                        Mycroft Holmes
                        wrote on last edited by
                        #18

                        Eddy Vluggen wrote:

                        Your users need access to an additional secret

                        Of course not the Application has the credentials, either an encrypted string in the config file or hard coded inside the app. Users have already been authenticated when they log into the app using AD.

                        Never underestimate the power of human stupidity RAH

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups