There are situations where you need to grant
SELECT permission to a particular user and limit that access to a particular
OBJECT, say a
Here’s a quick way of accomplishing this. In this example we’re using the AdventureWorks2008R2 database.
I have already created the
LOGIN in advance (“TestUser01“). Let’s map that to a
CREATE USER [TestUser01] FOR LOGIN [TestUser01] GO
The next step is to set the permission on the particular table we want the user to access:
You can further restrict access at the Column Level by setting the Column Permission as needed. Using the
HAS_PERMS_BY_NAME function in SQL Server, let’s check if we’ve granted user TestUser01 the SELECT permission he needed for the Employee table:
SELECT HAS_PERMS_BY_NAME ('AdventureWorks2008R2.HumanResources.Employee', 'OBJECT', 'SELECT') AS SELECT_PERM, name AS TABLE_NAME, type_desc, schema_id FROM sys.tables
The HAS_PERMS_BY_NAME function returns
true (1) or
false (0) to indicate whether permission has been granted or not.
The good thing about
HAS_PERMS_BY_NAME is that, it is accessible to the Public role – meaning Users with minimal access level can run a query containing the function. Or if you are an Admin and you want to test a newly altered user you can impersonate that user:
EXECUTE AS USER = 'TestUser01' GO SELECT HAS_PERMS_BY_NAME ('AdventureWorks2008R2.HumanResources.Employee', 'OBJECT', 'SELECT') AS SELECT_PERM, name AS TABLE_NAME, type_desc, schema_id FROM sys.tables GO REVERT GO
That should give us the same result shown above. This is how it looks like when TestUser01 logs in to the AdventureWorks2008R2 database:
No related posts.