You are on page 1of 2

User Administration

In order to make access distinctions and track user activity, security systems must know who is making each
request. The primary purpose of user administration is to provide information that helps systems make this
determination. The central piece of user information that the SAS environment requires is one external account ID
for each user. The SAS environment uses its copy of these IDs to establish a unique SAS identity for each
connecting user. All of a user's group memberships, role memberships, and permission assignments are ultimately
tied to their SAS identity.

SAS (previously "Statistical Analysis System") is a software suite developed by SAS Institute for advanced analytics,
multivariate analysis, business intelligence, data management, and predictive analytics.

A user is an individual person or service identity.

An individual SAS identity is established by coordination between two sets of identity information:

 in an external system, a user account


 in the metadata, a user definition that includes a copy of the external account ID

We recommend that you create groups to simplify security management as follows:

 It is more efficient to assign permissions to groups than to individual users.


 If you need to store passwords in the metadata, you can reduce the amount of required maintenance by using a
group to make one shared account available to multiple users.
 It is sometimes more efficient to manage role membership by assigning groups to roles instead of assigning users
directly to roles.

An internal account is a SAS account that the metadata server authenticates independently, without relying on an
external authentication provider such as the operating system. Use internal accounts for only metadata
administrators and certain service identities.

Windows Security
Windows Defender is a well-integrated security system built-in to the operating system. ... Windows Defender is
an antivirus and anti-malware in one. It detects malicious applications and possible threats while running in the
background.

Security Context
 One of the basic tenets of Windows Security is that each process runs on behalf of a user.
 So, each process running is associated with a security context.
 security context is a bit of cached data about a user, including her SID, group SIDs, privileges.

A SID, short for security identifier, is a number used to identify user, group, and computer accounts
in Windows.

 SIDs are created when the account is first created in Windows and no two SIDs on a computer are ever
the same.
How to access WINDOWS SECURITY features?
1. Open the control panel
2. From beneath the system and security heading, choose the
link review your computer’s status.
3. Click the down-pointing arrow button in the security
heading to reveal its contents

In Windows Vista and Windows XP


1. Open the Control Panel Window.
2. Open the Security Center window.
In windows vista, choose the link check this computer’s
Security status, found beneath the security heading.
In windows XP, open the Security center icon.

You can customize how your device is protected with these


features:
• Virus & threat protection.
• Account protection.
• Firewall & network protection.
• App & browser control.
• Device security.
• Device performance & health.
• Family options.

Status icons indicate your level of safety:


GREEN - Means your device is sufficiently protected and there aren’t any recommended actions.
YELLOW - Means there is a safety recommendation for you.
RED - Is warning that something needs your immediate attention.

You might also like