SQL authentication - mixed mode and windows auth

Posted on 2007-08-01
Medium Priority
Last Modified: 2008-03-10
What is the differences (security wise) in Mixed Mode  and windows authentication in SQL 2000?
Question by:tlperkins
LVL 143

Expert Comment

by:Guy Hengel [angelIII / a3]
ID: 19609546
mixed mode allows both Sql logins AND windows authentication logins.
LVL 75

Expert Comment

by:Aneesh Retnakaran
ID: 19609560
Mixed mode allows you to use both SQL +Windows authentication.So if you use Windows authentication, then you will get all the security features of that windows user.

Author Comment

ID: 19609568
I knew that but what is the security details of that?
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 20

Expert Comment

ID: 19609622
LVL 35

Expert Comment

ID: 19609640

Accepted Solution

ursangel earned 2000 total points
ID: 19651941
Windows Authentication Mode  - is the default authentication mode in SQL Server 2000. In this mode, the SQL Server 2000 relies solely on the Windows authentication of the user. Windows users or groups are then granted access to the SQL Server. Connections made to the server using this mode are known as trusted connections.

When Windows Authentication Mode is used, the database administrator allows users to access the computer running SQL Server by granting them the right to log in to SQL Server 2000. Windows security identifiers (SIDs) are used to track Windows authenticated logons. As Windows SIDs are used, the database administrator can grant logon access directly to Windows users or groups.

In Mixed Mode, users can be authenticated by Windows Authentication or by SQL Server Authentication. Users who are authenticated by SQL Server have their username and password pairs maintained within SQL Server.

Connections that rely on username and password pairs are called non-trusted connections, or SQL connections.


Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows gives you an overview on SQL Server 2016 row level security. You will also get to know the usages of row-level-security and how it works
A Stored Procedure in Microsoft SQL Server is a powerful feature that it can be used to execute the Data Manipulation Language (DML) or Data Definition Language (DDL). Depending on business requirements, a single Stored Procedure can return differe…
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
Using examples as well as descriptions, and references to Books Online, show the documentation available for datatypes, explain the available data types and show how data can be passed into and out of variables.
Suggested Courses

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question