Identification and authentication controls

Each Adaptive Server user is given a login account with a unique ID. All of that user’s activity on the server can be attributed to a server user ID and audited.

Adaptive Server passwords are stored in the master..syslogins table in encrypted form. When you log into Adaptive Server from a client, you can choose client-side password encryption to encrypt your password before sending it over the network.

A System Security Officer can grant a user the ability to impersonate another user in the server. This ability, called proxy authorization, allows administrators to check permissions for a particular user or to perform maintenance on a user’s database objects. Application servers can log in to the server and execute procedures and commands on behalf of several users.