Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How to access data on authenticated ASA server from ASE server

Posted on 2006-12-01
2
500 Views
Last Modified: 2009-07-29
Hi, we are trying to export some data from system running on ASE server to accounting system, that uses authenticated edition of ASA server. I have created remote server and proxy tables on ASE and I can read data from these tables. When I try to insert some data, I get "ASA Error -98: Authentication violation". I have obtained authentication code from our accounting system vendor, but I don't know how to tell ASE to use it. Does anybody know, how to pass this code to ASA ?
Jan
0
Comment
Question by:Jan_Franek
2 Comments
 
LVL 14

Author Comment

by:Jan_Franek
ID: 18063554
OK, it seems, that I have found the answer. I have used sp_passthru to send "SET TEMPORARY OPTION CONNECTION_AUTHENTICATION='authentication code'" to ASA server and now I'm able to insert, update or delete data - as long as my connection to ASA lives.
0
 
LVL 1

Accepted Solution

by:
kodiakbear earned 0 total points
ID: 18064295
Closed, 500 points refunded.
kb
Experts Exchange Moderator
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question