Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, users Rss

   Items 1 to 5 of 5   
 

Database User Superfluousness In SQL Server

In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.  Read more...
By Thomas Knight 2014/02/04 | Source: SQLServerCentral.com | Category: users
Rating: |  Discuss |   Briefcase | 3,884 reads

List orphaned users from all databases

The script returns all orphaned database users across a SQL Server.  Read more...
By James Howard 2013/07/15 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,911 reads

List orphaned users from all databases

The script returns all orphaned database users across a SQL Server.  Read more...
By James Howard 2013/07/15 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,911 reads

Resolving User Security Identifier (SID) Discrepancy in Read-Only Databases

Many experienced DBAs understand the issues with matching up users and logins in a restored database. But what do you do when the database is read only? New author Tychang Chen brings us a technique that can help.  Read more...
By Yichang Chen 2009/12/28 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,997 reads

Please, Sir, I want some more… orphaned database users.

Permissions on our development servers are considerably less stringent than elsewhere with developers afforded the freedom to restore backup’s ad-hoc....  Read more...
By jameshoward3 2009/12/04 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated)  Rate this |   Briefcase | 1,743 reads
   Items 1 to 5 of 5   
 
Tags
logins (2)    
administration (1)    
blogs (1)    
database users (1)    
orphaned (1)    
sql server (1)