Configuring Kerberos Authentication
Longtime author Brian Kelley brings us a new article on security and Kerberos authentication in SQL Server.
2011-03-28 (first published: 2008-12-11)
60,897 reads
Longtime author Brian Kelley brings us a new article on security and Kerberos authentication in SQL Server.
2011-03-28 (first published: 2008-12-11)
60,897 reads
2008-12-05
3,736 reads
2008-12-04
3,214 reads
One of the things you need to aware of is that if you create a logon trigger and there is some bad code you are going to prevent everyone from logging into your SQL Server, even if you try as "sa" or a member of the sysadmin fixed server role. How do I log on to my SQL Server to fix this trigger?
2008-12-02
3,887 reads
we need change all user table db owners For selected database using T SQL we can easily use this method.
2008-12-29 (first published: 2008-11-30)
1,221 reads
Permissions on data are one of the most critical aspects of database administration.
2008-11-10
3,072 reads
Implementing a dialog between two services residing in a distributed environment requires the presence of an authentication mechanism. Windows-based Kerberos protocol limits the scope of systems participating in a Service Broker dialog to those residing in the same or trusted Active Directory domains. This article provides an overview of how to eliminate this limitation by employing certificates.
2008-11-03
2,198 reads
Databases often contain sensitive information and cell-level encryption is a very effective method to protect this information from those who should not have access to it. Although, encryption is not without its challenges.
2008-10-29
3,815 reads
Instead of granting higher level permissions, is there a way to allow users that only have public access the ability to see object definitions?
2008-10-13
3,693 reads
Attaching and restoring databases from one server instance to another are common tasks executed by a DBA. After attaching or restoring of a database, previously created and configured logins in that database do not provide access. This tip looks at how to deal with this.
2008-10-09
4,605 reads
By Steve Jones
It’s that time of the month, and I’m late. My apologies. I had a...
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers