Most databases and data sources provide alternative authentication methods to standard user id and password authentication. Authentication methods such as Kerberos, LDAP, and OAuth 2.0 provide a more secure mechanism for exchanging credentials. We recommend that these authentication alternatives are used whenever possible.

Refer to the user's guide for your driver for details on supported authentication methods.