Who Are Your Authenticated Users?

  • Comments posted to this topic are about the item Who Are Your Authenticated Users?

  • it certainly IS important that the scope of a security setting be known.  Especially for the cloud, I'd assume nothing and make damned sure that I understood the scope (there has be a document somewhere) the scope.

    I do, however, have to agree that most people will assume that "Authenticated Users" would mean "just in the scope of my users for my stuff".  There's a whole lot to be said for how people name things.  If the security setting had been named "Any User in the World", the name would have said it all.

    --Jeff Moden


    RBAR is pronounced "ree-bar" and is a "Modenism" for Row-By-Agonizing-Row.
    First step towards the paradigm shift of writing Set Based code:
    ________Stop thinking about what you want to do to a ROW... think, instead, of what you want to do to a COLUMN.

    Change is inevitable... Change for the better is not.


    Helpful Links:
    How to post code problems
    How to Post Performance Problems
    Create a Tally Function (fnTally)

  • p.s.  And thank you for the article... articles like this are incredibly value.  Thanks for what you do, Steve.

    --Jeff Moden


    RBAR is pronounced "ree-bar" and is a "Modenism" for Row-By-Agonizing-Row.
    First step towards the paradigm shift of writing Set Based code:
    ________Stop thinking about what you want to do to a ROW... think, instead, of what you want to do to a COLUMN.

    Change is inevitable... Change for the better is not.


    Helpful Links:
    How to post code problems
    How to Post Performance Problems
    Create a Tally Function (fnTally)

  • That... that... seems like some very poor wording on the part of that security setting, that really means it's just one step short of completely public.

Viewing 4 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic. Login to reply