is secured by using authentication records and by assigning connection privileges on the server side. Client-server connections are controlled on both the client and server sides of the system. When a client initiates a connection to a server, the client supplies appropriate authentication to the server before the connection (as defined by the connection privileges) is permitted.