Windows Group Membership Checker
A script to reveal which logins have access to your sql server via windows groups.
2010-12-09 (first published: 2010-08-26)
2,423 reads
A script to reveal which logins have access to your sql server via windows groups.
2010-12-09 (first published: 2010-08-26)
2,423 reads
I have been tasked with auditing security on my SQL Server. However, this needs to be a somewhat automated process as I don't want to have to rely on taking screenshots every month to satisfy our auditors. What tables and/or views should I be using and what's the best way to extract the information out of them?
2010-08-25
3,618 reads
This document provides you with information that will help you understand the concepts of identity in SharePoint 2010 products, how Kerberos authentication plays a critical role in authentication and delegation scenarios, and the situations where Kerberos authentication should be leveraged or may be required in solution designs. The document also shows you how to configure Kerberos authentication end-to-end within your environment, including scenarios which use various service applications in SharePoint Server. Additional tools and resources are described to help you test and validate Kerberos configuration. The "Step-by-Step Configuration" sections of this document cover several SharePoint Server 2010 scenarios.
2010-08-13
2,438 reads
As I am new to Windows Server 2008 R2 it would be great if you can let me know the step by step approach to enable the default port of SQL Server 2008 Analysis Services in Windows Firewall for user connectivity.
2010-04-29
2,698 reads
2010-04-09
3,216 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,529 reads
2010-03-23
2,902 reads
If you think through the web sites you visit on a daily basis the chances are that you will need to login to verify who you are. In most cases your username would be stored in a relational database along with all the other registered users on that web site. Hopefully your password will be encrypted and not stored in plain text.
2010-03-10
3,893 reads
I have a requirement to implement a custom security scheme where roles and the user's place in the organization hierarchy are used to determine which customers a user can access. In particular the requirements are that a sales person can only access their customers and any other role can access any customer in their level of the organization hierarchy and below. We have a simple hierarchy that is made up of regions and offices. Can you provide us with an example of how to do this?
2010-03-01
3,410 reads
SQL Server impersonation, or context switching, is a means to allow the executing user to assume the permissions of a given user or login until the context is set back, set to yet another user, or the session is ended. Deanna Dicken shows you two mechanisms for accomplishing this task and walks through some examples.
2010-02-25
2,388 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
Below you will find How to Apply for a Gold Mandate License in Cameroon...
Environment: SQL Server: 2019 Enterprise (15.0.4430.1) OS: Windows Server 2022 Standard (Build 20348) Virtualization:...
I am trying to create a filter on a SQL Server audit to capture...
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers