Databases use several types of authentication and authorization techniques to protect the sensitive data they contain. In this video, Mike Chapple explains the use of database access controls.
- [Instructor] Databases use several authentication…and authorization techniques to protect the sensitive data…that they contain.…Database authentication uses many of the same concepts…that we've already talked about.…You can create database users who may then authenticate…to the database using passwords…or other authentication techniques.…The specific technologies available to you…will depend on the database platform you choose.…For example, Microsoft SQL Server supports…three different types of user authentication.…
In SQL Server authentication, the database uses…local user accounts that are created…inside of the database server.…In Windows authentication mode,…the database uses the Windows accounts available…through the underlying operating system,…which may be using centralized authentication…through active directory.…And in mixed authentication mode,…you can use both local accounts and Windows accounts.…Other database platforms use similar authentication…techniques that combine local accounts with those…in a central authentication system.…
Instructor Mike Chapple has designed the training around the most recent version of CompTIA Security+, SY0-501, which expands coverage of mobile and cloud technologies. By learning about the topics in this course, you'll be prepared to answer questions from the latest exam—and strengthen your own organization's systems and defenses. To join one of Mike's free study groups, visit certmike.com.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Identification methods
- Authentication factors
- Multifactor authentication
- Single sign-on
- Authorization and access controls
- Account management