I know enough about SQL to be dangerous. I do not normally
use the product, but I do perform security audits on it.
My question has to do with authentication. There are
3 methods to use: 1. Windows 2. SQL 3. Both
From my little experience, I know that number 1 (Windows)
is the recommended authentication method. What I'd like
to know is: How does method 3 work? I'm guessing that
if a user cannot authenticate using SQL, then Windows
authentication is tried. Am I correct?
PS: I did search Microsoft but came up empty.....
Thanks,
Rayj00