Granting View Definition Permission to a User or Role
Instead of granting higher level permissions, is there a way to allow users that only have public access the ability to see object definitions?
2008-10-13
3,693 reads
Instead of granting higher level permissions, is there a way to allow users that only have public access the ability to see object definitions?
2008-10-13
3,693 reads
Attaching and restoring databases from one server instance to another are common tasks executed by a DBA. After attaching or restoring of a database, previously created and configured logins in that database do not provide access. This tip looks at how to deal with this.
2008-10-09
4,605 reads
This white paper presents an overview of cryptographic functionality and discusses how this applies to authentication, signed procedures, permissions, and encryption. Because the target audience is the database professional and not necessarily security experts, the focus is on practical ways to use cryptography in SQL Server.
2008-09-26
3,859 reads
DBA's and web developers at our company are experiencing issues with connecting to SQL instances using SQL Server Management Studio and other SQL tools using Windows Integrated Authentication. Our company is large, with well over 70,000 users and groups in Active Directory. When we look in the NT event log on the SQL Server we see both MSSQL and Kerberos errors. What could be causing this?
2008-08-25
3,296 reads
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
2008-08-22
4,820 reads
2008-08-20
2,840 reads
SQL Server trainer and expert DBA, Andy Warren, thinks that everyone should have a philosophy about security. He starts this installment in looking about how to assign administrative privileges.
2008-08-12
4,563 reads
Locate and remove/delete user logins from all databases and even SQL server.
2008-08-08
11,176 reads
2008-07-23
2,996 reads
This script is helpful to identify the orphaned users in a database, useful when we restore a database from a different location.
2013-05-22 (first published: 2008-07-20)
2,682 reads
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
Comments posted to this topic are about the item Your Value from a Conference
Comments posted to this topic are about the item UNISTR Basics
What does this code return in SQL Server 2025+? (assume the database has an appropriate collation)
SELECT UNISTR('Hello 4E16754C') AS 'A Classic';
A:
B:
See possible answers