Difference between revisions of "Windows Authentication with XLCubed Web Edition"

 
Line 1: Line 1:
 
<onlyinclude>The default and most common method, Windows Authentication (also known as Integrated Authentication) would be used in most organisations as the authentication, and therefore access, is controlled through the same mechanisms as other network resources.
 
<onlyinclude>The default and most common method, Windows Authentication (also known as Integrated Authentication) would be used in most organisations as the authentication, and therefore access, is controlled through the same mechanisms as other network resources.
  
The client's current credentials will be passed to the server and will be used when connecting to the datasource. If the database server is on a different server then they will only receive the credentials if [[Kerberos Delegation]] has been configured. (Kerberos will need to be set up and configured by a domain administrator. Most large organisations will have an existing process for doing this - the previous article contains all the information required.)</onlyinclude>
+
The client's current credentials will be passed to the server and will be used when connecting to the datasource. If the database server is on a different server then they will only receive the credentials if [[Kerberos Delegation]] has been configured. (Kerberos will need to be set up and configured by a domain administrator. Most large organisations will have an existing process for doing this - the previous article contains all the information required.)
 +
 
 +
Note that if the datasource requires additional credentials to be entered, then this will be performed as a separate step when the report is opened. This can be the case when, for example, the datasource uses Basic authentication.</onlyinclude>
  
 
==See Also==
 
==See Also==

Latest revision as of 14:51, 17 February 2022

The default and most common method, Windows Authentication (also known as Integrated Authentication) would be used in most organisations as the authentication, and therefore access, is controlled through the same mechanisms as other network resources.

The client's current credentials will be passed to the server and will be used when connecting to the datasource. If the database server is on a different server then they will only receive the credentials if Kerberos Delegation has been configured. (Kerberos will need to be set up and configured by a domain administrator. Most large organisations will have an existing process for doing this - the previous article contains all the information required.)

Note that if the datasource requires additional credentials to be entered, then this will be performed as a separate step when the report is opened. This can be the case when, for example, the datasource uses Basic authentication.

See Also