Using an integrated login
88
Example
The following SQL statement sets the value of the LOGIN_MODE database
option to
Mixed
, allowing both standard and integrated login connections:
SET OPTION "PUBLIC".LOGIN_MODE = Mixed
Creating an integrated login
User profiles can only be mapped to an existing database user ID. When that
database user ID is removed from the database, all integrated login mappings
based on that database user ID are automatically removed.
A user profile does not have to exist for it to be mapped to a database user ID.
More than one user profile can be mapped to the same user ID.
Only users with DBA authority are able to create or remove an integrated login
mapping.
An integrated login mapping is made either using a wizard in Sybase Central
or a SQL statement.
❖
To map an integrated login from Sybase Central:
1
Connect to a database as a user with DBA authority.
2
Open the Integrated Logins folder for the database, and double-click Add
Integrated Login. The Integrated Login wizard is displayed.
3
On the first page of the wizard, enter the name of the system (computer)
user for whom the integrated login is to be created. You can either select a
name from the list or enter a name.
Also, select the database user ID this user maps to. The wizard displays the
available database users. You must select one of these. You cannot add a
new database user ID.
4
Follow the remaining instructions in the Wizard.
❖
To map an integrate login using a SQL statement:
•
The following SQL statement allows Window NT users dmelanso and
bhay to log in to the database as the user
DBA
, without having to know or
provide the DBA user ID or password.
GRANT INTEGRATED LOGIN
TO dmelanso, bhay
AS USER DBA
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...