I have worked with SQL Server for many years now, back to Sybase SQL Server days and there has always been confusion over Logins and Users. Even though they typically use the same name they are ...
You'll find that working with SQL Server security using these simple guidelines will make your administration simple. If you have to apply the security manually for a SQL Server-based application to ...
In my next several posts, I'd like to take a good look at SQL Server security. We'll primarily focus on SQL Server 2008 R2, which is the latest release. Many of the concepts I plan to discuss will ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part in ...
Last time, we talked about security from a user's point of view. In this post, let's discuss how applications should authenticate with SQL Server. Like user logins, application logins need to be ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
When working with my customers on SQL Server security, I constantly get the same question, “What are some best practices for hardening my SQL Server implementation?” Over the years, I have come up ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results