Labels:text | poster OCR: Master Security Tables Network Security Processor 1 Processor 2 Operating System Operating System Database 1 Database Database n New User Database,n. Password FIGURE 5 Another method for controlling security is to give each of the dis- tributed system components direct access to the security tables. This eliminates the exposure of having redundant passwords stored in each pro- cessor, and provides a simple point of control for the entire federation.