Application Development


Chapter 40. Identifying Users

An application must be able to identify its users and to prevent users without proper identification from its use.


Two-tier Applications

In two-tier applications, user authentication is needed for database access. When you connect to most database engines, you must supply a user name and password.

Panther applications use DBMS DECLARE CONNECTION statements to connect to a database engine. The documentation for each database engine lists the connection options available for that engine; refer to Database Drivers .


JetNet Applications

JetNet applications have two levels of identification:


MTS Applications

MTS offers two types of security for component packages: programmatic security, which uses interfaces to call within the application, and declarative security, which assigns users, or groups of users, to roles.

A role is the name assigned to a group of users that will access a component package. For example, a human resources application could define roles for Manager and Employee.

Panther MTS applications can implement programmatic security using the following functions which call methods of the IObjectContext interface:

Refer to Microsoft's MTS Documentation for additional information about MTS package security.