Click here to Skip to main content
15,921,250 members
Please Sign up or sign in to vote.
1.00/5 (1 vote)
See more:
Where windows-authentication is stored which we can use to log-in SQL-server?

SqlServer must be getting user name and password from some mechanism? From where it get that details? Does it invoke some OS method to get that?

OR Somewhere it is stored which it use automatically?
Posted
Updated 5-Jun-11 23:11pm
v2
Comments
Dylan Morley 6-Jun-11 5:21am    
Please have a look at the article I posted regarding Kerberos.

SQLServer doesn't get 'username and password' from anywhere, you've gone through a ticket 'challenge and response' mechanism with an authentication server that will allocate you a ticket

SQLServer is checking the Ticket you've been allocated, this is how it knows who you are and your credentidals are valid

Have a look at this article as well

http://learn-networking.com/network-security/how-kerberos-authentication-works

Windows authentication is not stored anywhere. It allows you to use your windows/AD username and password to connect to database.

http://databases.about.com/od/sqlserver/a/authentication.htm[^]
 
Share this answer
 
Comments
Sergey Alexandrovich Kryukov 6-Jun-11 15:15pm    
It's correct (a 5), but why?
I think OP lack of understanding what authentication does in principle.
Please see my explanation.
--SA
You can check the Login Property[^] for a particular user, but as Prekak Patel has said the Authenication isn't stored on SQL Server
 
Share this answer
 
Comments
Sergey Alexandrovich Kryukov 6-Jun-11 15:14pm    
Good, my 5. I think OP lack of understanding what authentication does in principle.
Please see my explanation.
--SA
As mentioned, Windows Authentication details aren't stored anywhere.

Have a look at the Kerberos Protocol[^] which describes the one way hashing and Ticket based system.
 
Share this answer
 
Comments
Sergey Alexandrovich Kryukov 6-Jun-11 15:07pm    
My 5.
--SA
Sergey Alexandrovich Kryukov 6-Jun-11 15:15pm    
I think OP lack of understanding how security works in principle.
Please see my explanation.
--SA
Apparently you're not getting the answers. Let give you some explanation. I don't know where the authentication is stored in each case, but I know for sure that the password is not stored anywhere. Not at all! This is because to store a password means to betray the owner of the password, and because the password is not needed for authentication (surprise?).

There are different techniques; the simplest one is using a Cryptographic Hash Function, see http://en.wikipedia.org/wiki/Cryptographic_hash_function[^]. You hash the password and store the hashed form of it only. To authenticate, you only need to compare one hashes password with the stored hashed password, never a password itself. You never need it. And this is impossible to refer the hash to get original password. Each Cryptographic Hash Function is designed to prevent that.

—SA
 
Share this answer
 
Comments
Simon_Whale 6-Jun-11 17:17pm    
in respect to SQL server - windows authentication mode it uses the username and password that is stored within AD (Active Directory)
Sergey Alexandrovich Kryukov 6-Jun-11 21:44pm    
I'm not an expert here. Could you confirm that a password is not stored as is, in its original form, but is stored in its encrypted or hashed form?
--SA
sushil_gupta 6-Jun-11 22:43pm    
Actually I was looking for that kind of answer.
So SQL server gets the information from AD(Active Directory). Thanks you so much.
Sergey Alexandrovich Kryukov 7-Jun-11 16:31pm    
You're very welcome.
If so, will you this answer as accepted, formally (green button)? You can mark more then one.
Thank you.
--SA
Prerak Patel 7-Jun-11 5:24am    
Nice explanation, my 5...

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900