Security Infrastructure for BDC
Published: May 2010
Business Data Connectivity (BDC) service supports two authentication models: Trusted Subsystem and Impersonation and Delegation. For authorization, you can use either of two patterns to control user access to data managed by the Microsoft Business Connectivity Services (BCS): back-end authorization or middle-tier authorization.
This section describes the BDC authentication and authorization models: