Last time, we talked about security from a user's point of view. In this post, let's discuss how applications should authenticate with SQL Server. Like user logins, application logins need to be ...