You need to configure a security solution for an application. The solution must meet the following requirements:
* The application must have access to tables in a database
* The tables must only be accessed through the application
* Database access must not require a password
What should you create?
A.
a database user that has no login
B.
a new login that has a blank password
C.
an application role
D.
a proxy object
Explanation:
The main advantage of using users without logins rather than approles is that permission to impersonate is based on permissions and not on a password, eliminating the need to share a password that most likely will be hardcoded into an application.