What should you create to configure a security solution for an application?

You need to configure a security solution for an application. The solution must meet the following requirements:
* The application must have access to tables in a database
* The tables must only be accessed through the application
* Database access must not require a password
What should you create?

You need to configure a security solution for an application. The solution must meet the following requirements:
* The application must have access to tables in a database
* The tables must only be accessed through the application
* Database access must not require a password
What should you create?

A.
a database user that has no login

B.
a new login that has a blank password

C.
an application role

D.
a proxy object

Explanation:
The main advantage of using users without logins rather than approles is that permission to impersonate is based on permissions and not on a password, eliminating the need to share a password that most likely will be hardcoded into an application.



Leave a Reply 0

Your email address will not be published. Required fields are marked *