473,387 Members | 1,904 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

integratedSecurity login from Linux -> SQL Server 2005?

aj
SQL Server 2005
MS JDBC driver 1.1

OK - I've gotten to the point where I understand specifying
integratedSecurity=true;
in the JDBC URL connection properties to establish a connection
w/ SQL Server based on the login/password I've already used to
login to Windows. (I'm in a domain, and my SQL Server authentication
is mixed mode).

Now, I'd like to do this from Linux - that is, establish a connection
to SQL Server w/ the login/password I've already used to login to Linux.

The Windows domain authentication is based on Kerberos, yes? So this
should be possible, correct?

Any insight greatly appreciated...

aj
Sep 11 '07 #1
0 1860

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Geiregat Jonas | last post by:
I'm running a linux system I would like to create a login system based upon the users and passwd of my linux box how could I do this ?
2
by: Michael W. Folsom | last post by:
Folks: I need to find a blog software that requires users to login before they view the blog. It would be real handy if this feature was rolled into the program so it could be turned on or off...
1
by: Toralf Lund | last post by:
Is there any way at all I can get a user's login name from within JavaScript on Unix/Linux with Mozilla browser. If not, how about the home directory? I know there are *usually* variables...
2
by: Tom | last post by:
I hope someone can help me figure out what's going on here. I've re-read the section on sessions at php.net and Googled this high and low but I haven't found anything that quite explains my...
24
by: David Mathog | last post by:
On a Solaris 8 system if a user "joe" logs in, for instance via ssh, cuserid() returns "joe". That's the expected behavior and so far so good. However if that user then does: % su - sally ...
2
by: jsharp999 | last post by:
Running Redhat Enterprise Linux release 4. I'm pretty new at this and this is a brand new installation. Everytime I login I get the following message: login: Cannot resolve network address for...
5
by: satya61229 | last post by:
Hello Linux Guru I am facing very serious issues of begin spying. I am sure of that. Idiots are doing that. But I am not very well in linux, so i cannot get the log of that. can you tell...
3
by: java.inet | last post by:
hi how to login ... <form name="form1" method="post" action=""> <input type="text" name="user"> <input type="password" name="id"> <input type="submit" name="Submit" value="Submit"> </form>
28
by: jatrojoomla | last post by:
Hi! could anyone give me some clue that how to create 'remember login' functionality during login Thanks Sukalyan
1
by: aradhanathawait | last post by:
Hi all Please tell me the default Login Id and password for Tomcat5.0 Admin. I have installed tomcat5 on Red hat linux 4, it didn't ask for admin password during installlation. Thanx and...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.