This document provides the solutions for Module 4 Assignment in ITEC 4242 Spring 2019, Session 2. It includes a discussion on the advantages of Windows Authentication and Active Directory Authentication methods. It also includes screenshots of the Object Explorer Details view, created tables, SELECT query results, and permissions assigned to tables.
Contribute Materials
Your contribution can guide someoneโs learning journey. Share your
documents today.
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 Module 4 Assignment Solutions: Task1 - open the Object Explorer Details view (F7), make sure all information is visible, and take a screenshot. P a g e1|13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 Task 2 - discuss the advantages of Windows Authentication and Active Directory Authentication methods Windows authentication is more secure since it utilizes a certificate based security system. Windows-validated logins pass an entrance token rather than a name and secret phrase to SQL Server. Windows relegate the entrance token when the client signs in. It contains an interesting security ID (SID) for that client and the SIDs of any groups to which the client has a place. It compares with all the SIDs in the sys.server_principals and login is either allowed or denied access to SQL Server. When the client interfaces with the database, the client is not required to enter a client name and secret key. A single sign-on at login gives access to all administrations that help Windows verification("Windows Authentication", 2019) SQL Server Authentication implies the record lives in the SQL server ace database yet no place on the Domain. The username and secret phrase gets stored in the ace database. On the off chance that the secret key needs transformation, it is changed on each case separately to keep them all in a state of harmony. Utilizing SQL Server Authentication enables you to supersede the Domain Security approaches concerning secret word intricacy and secret word lapse(Hunter, Allen & Allen, 2009). Task 3 โ (1) in the object Explorer window, expand the Tables folder in your new database to show your created tables then take a screenshot and (2) perform a SELECT query on the Books table and screenshot the results. P a g e2|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 Task 4 - For each role, create a chart that shows each table that they would need access to and the privilege levels of access needed (SELECT, INSERT, UPDATE, DELETE). P a g e3|13 Marketing Manager Promotions Orders Customers Books ALL SELECT SELECT SELECT
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e4|13 Data Entry Clerk Author Publisher Books Book Author ALL ALL ALL ALL Customer Service Represent ative Customers Order Items Orders SELECT ALL ALL
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 Task 5 - take a screenshot (3 total) of the Securables page within each roleโs Properties window, showing the permissions assigned to one of the requisite tables. P a g e5|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e6|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e7|13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 Task 6 - take a screenshot (5 total) of each userโs Membership page, showing they have been assigned the appropriate role. P a g e8|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e9|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e10|13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 P a g e11|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 References 1.Guidorizzi, R. (2013). Security: Active Authentication.IT Professional, 15(4), pp.4-7. 2.Hunter, L., Allen, R., & Allen, R. (2009).Active directory cookbook. Sebastopol, CA: O'Reilly. 3.Windows Authentication. (2019). Retrieved from https://docs.microsoft.com/en-us/iis/configuration/system.webserver/security/ authentication/windowsauthentication/ 4.Download SQL Server Management Studio (SSMS) - SQL Server. (2019). Retrieved from https://docs.microsoft.com/en-us/sql/ssms/download-sql-server-management-studio- P a g e12|13
ITEC 4242Module 4 AssignmentSpring 2019, Session 2 ssms. 5.Guo, H., Jones, D., Beckmann, J., & Seshadri, P. (2009). Declarative management in Microsoft SQL server.Proceedings Of The VLDB Endowment,2(2), 1294-1305. doi: 10.14778/1687553.1687555. P a g e13|13