This is a text description of sad81001.gif.
Figure 1-2:
This illustration is a flow diagram showing the choices available for database authentication schemes, depending upon whether you are administering the database from a remote client or locally from the same machine where the
database resides. If you are administering the database locally, or from a remote client with a secure connection, you have the following choices: