A cross-language technology for data access that exposes an object model incorporating data connection objects, data command objects, Recordset objects, and collections within these objects. The ADO object model provides an easy-to-use set of objects, properties, and methods for creating script that accesses data in databases.
A security mechanism in which you allow access to files on a server computer through permissions broadly granted by that server, and then impersonated by the requestor. Used for Web-based applications, anonymous authentication is useful when files (including Web pages) on a server computer must be available to users whose identities are unknown.
A security mechanism in which the user's credentials are checked when they log in to a network computer to do something that requires certain privileges. After an initial logon to a Microsoft® Windows NT® workstation or server, authentication typically happens invisibly to the user. Note that the user can be a person, a computer, or a process.
In Remote Automation, an application that passes Remote Automation requests from the client components on a network through the automation proxy to the appropriate Remote Automation server components. This application must be running for a computer to accept Remote Automation requests.