home *** CD-ROM | disk | FTP | other *** search
/ Developer Source 7 / developer source - volume 7.iso / dbmsa / may95 / burl15.gif < prev    next >
Graphics Interchange Format  |  1996-11-15  |  49KB  |  466x335  |  4-bit (16 colors)
Labels: text | poster
OCR: Master Security Tables Network Security Processor 1 Processor 2 Operating System Operating System Database 1 Database Database n New User Database,n. Password FIGURE 5 Another method for controlling security is to give each of the dis- tributed system components direct access to the security tables. This eliminates the exposure of having redundant passwords stored in each pro- cessor, and provides a simple point of control for the entire federation.