June 2005
Intermediate to advanced
722 pages
18h 9m
English
![]()
In the previous chapter, we discussed the performance and scalability benefits of using connection pooling. In this chapter, we'll direct our attention to the security issues involved in a three-tier architecture that uses connection pooling. In particular, we'll focus on different alternatives of mapping an application end user to a database end user and different ways in which an application can authenticate to the database on behalf of an end user. We'll cover the following authentication alternatives:
Read now
Unlock full access