C
C Newby
In the MSDN article ".NET Data Access Architecture Guide", the following
statement is made in reference to connection pooling:
---
Avoid impersonation in the middle tier. Windows authentication requires a
Windows account for database access. Although it might seem logical to use
impersonation in the middle tier, avoid doing so because it defeats
connection pooling and has a severe impact on application scalability.
To address this problem, consider impersonating a limited number of Windows
accounts (rather than the authenticated principal) with each account
representing a particular role.
---
Perhaps I am unclear as to what is meant by "authenticated principal", but
it seems that the article is saying not to use integrated security, a means
by which (as I understand it) on can automatically pass a user's credentials
down through each application layer.
If this *is* the case, how exactly does this undermine the purpose of
connection pooling and the pursuit of scalability?
I think i'm misunderstanding something, but what?
TIA//
statement is made in reference to connection pooling:
---
Avoid impersonation in the middle tier. Windows authentication requires a
Windows account for database access. Although it might seem logical to use
impersonation in the middle tier, avoid doing so because it defeats
connection pooling and has a severe impact on application scalability.
To address this problem, consider impersonating a limited number of Windows
accounts (rather than the authenticated principal) with each account
representing a particular role.
---
Perhaps I am unclear as to what is meant by "authenticated principal", but
it seems that the article is saying not to use integrated security, a means
by which (as I understand it) on can automatically pass a user's credentials
down through each application layer.
If this *is* the case, how exactly does this undermine the purpose of
connection pooling and the pursuit of scalability?
I think i'm misunderstanding something, but what?
TIA//