sql server 2014 - Application Security Models

Hi experts

what is it the difference between
Trusted Server Application Security Model
Impersonation / Delegation Security Model
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

that is a very long answer

this sums it up really well

Taken from

Security models for distributed applications may choose to adopt two different approaches: the Trusted model or the Delegate model. Both models require knowing the identity of the caller on the server side. In the Trusted model, access checks are performed "at the gate" when the remote call hit the application server.

This is typically done using COM+ or .NET role- based security, which performs access checks at the application level semantic. In the Trusted model, the "check at the gate" is considered exhaustive. After the call is allowed to get into the application layer, the work is done using the identity of the process hosting the component (this includes database access).

On the other hand, in the Delegate model "checks at the gate" (if any) are not considered exhaustive; hence, the execution of the remote call is done impersonating the caller identity, so additional access checks at the database level or by other downstream application server can be done against the original caller credentials.

The Trusted model is by far the easiest one to implement and manage, whereas the Delegate model is more difficult to implement properly and requires a much more administrative burden. In some situations, strict requirements dictate the adoption of a Delegate model. Most times, however, a Trusted model coupled with robust auditing will strike the balance between security requirements and ease of management.

thankfully the people at microsoft have very rich articles concerning both



Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
enrique_aeoAuthor Commented:
what is it the difference between
Trusted Server Application Security Model - SQL Server access is based on application identity
Impersonation / Delegation Security Model- SQL Server access is based on user identity
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Microsoft SQL Server 2008

From novice to tech pro — start learning today.