Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

how to identify first time user and a registered user

Posted on 2014-09-26
3
111 Views
Last Modified: 2014-09-26
I'm working on a database design for a credit card processing web application.  We are using single sign-on to authenticate users, so the username and password will not be stored in the database schema.  What I'm trying to determine right now is when a user logs in if they are a first-time user or if they are a registered user.  I have a contact table and I was thinking I could just add a new column to the contact table "registeredUser" that is a bit datatype.  But, I'm wondering if this is limiting and if there was a better design choice.  Please see the attached database diagram.

Thanks for any help from any database experts out there.

9-26-2014-8-46-31-AM.jpg
0
Comment
Question by:-Dman100-
3 Comments
 
LVL 48

Expert Comment

by:Vitor Montalvão
ID: 40346235
How can a user log in if isn't registered?
0
 

Author Comment

by:-Dman100-
ID: 40346285
They can login thru single sign-in, but they won't have specific permissions in the application until after they have gone thru the first time registration process.  Perhaps using the term register is misleading.  Basically, I need to differentiate between a first time user and a user that has gone thru the first-time registration process in the application.  Does that help explain?
0
 
LVL 69

Accepted Solution

by:
Scott Pletcher earned 500 total points
ID: 40346450
I would use a separate table for that flag.  To me it's possible there might be new apps developed that would fall under the SSO umbrella, and you'd need to distinguish registration for each app separately.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Microsoft – Kerberos Configuration Manager. Delegation service account query 1 37
SSRS Deployment problem 5 65
Database Integrity 1 49
Help With SQL Query 9 30
Introduction SQL Server Integration Services can read XML files, that’s known by every BI developer.  (If you didn’t, don’t worry, I’m aiming this article at newcomers as well.) But how far can you go?  When does the XML Source component become …
Ever needed a SQL 2008 Database replicated/mirrored/log shipped on another server but you can't take the downtime inflicted by initial snapshot or disconnect while T-logs are restored or mirror applied? You can use SQL Server Initialize from Backup…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question