Share via


Business Data Catalog: Security Model

This section contains overviews of the Business Data Catalog authentication and authorization models.

In this section

  • Business Data Catalog Authentication
    Describes the two authentication patterns you can use to authenticate Business Data Catalog users: Trusted Subsystem, and Impersonation and Delegation.
  • Business Data Catalog Authorization
    Explains the two authorization patterns you can use to control user access to data managed by the Business Data Catalog: back-end authorization and middle-tier authorization.