Subject RE: [IB-Architect] User authentication
Author Ann W. Harrison
Hello all!

If you check the archives of this list you will find that
the discussion of authentication and mapping from an authenticated
individual to an SQL user has been discussed before. No big
surprise there.

From that discussion, many of us understood that there is no
one solution that appeals to everyone - some people like isc4,
more reasonable people don't. Some applications need very
tight security - most don't want to pay that price.

What we decided was that a security plug-in is the way to go.
Establish an API that the engine can use to access a variety
of authentication and mapping schemes. There's a security
plug-in on Linux called ... posy? pansy? ... that might be a


We have suggestions.