Viewing 15 posts - 346 through 360 (of 1,219 total)
In the end, you need to ask yourself why you are encrypting the data. That is, what do you want to protect yourself against, and what is out of scope?
June 4, 2016 at 3:05 am
Too many unknowns to say anything with certainty. Maybe you should go back to the drawing board and find a different solution.
One idea, but I don't know if it fits,...
April 9, 2016 at 11:38 am
If you read the topic for ALTER AUTHORIZATION in Books Online, you will find this sentence: If the target entity is not a database and the entity is being transferred...
April 9, 2016 at 2:53 am
Your question is a bit open-ended, and there is not much information about your application.
But assuming that you use stored procedures to read and write data, you can use the...
March 30, 2016 at 12:31 pm
You will see the Windows user name, not the group name.
February 11, 2016 at 8:30 am
What are the alternatives?
Since the user do not have SQL Server access, the application cannot impersonate them.
The application could use an SQL login, but I would definitely hold that as...
February 4, 2016 at 2:48 pm
That depends. Adding to sysadmin would of course be out of the question. But if the account is only given access to the database for the application and in this...
February 4, 2016 at 9:01 am
You don't set up proxy account per user. You set up a single proxy account that all non-sysadmin users. That would be a special login that is not used for...
January 5, 2016 at 1:57 pm
If you want to know the overhead of TDE, you can use (distributed) replay. That is, first capture a reasonable amout of workload with a trace. Then set up a...
December 1, 2015 at 1:46 pm
If you have a 24/7 system, you have no choice but running index rebuild on the system while it is live.
But there is very much which is unclear in your...
November 24, 2015 at 1:54 pm
I'm not sure that enabling TDE causes fragmentation, but I could be wrong.
If you have Enterprise Edition - and obviously you have, since you have TDE - you can use...
November 24, 2015 at 10:46 am
You can sign the procedure with a certificate. From the certificate you create a user which you grant the permissions needed.
I describe this technique in detail in an article on...
November 16, 2015 at 6:34 am
I can see two possible explanations:
1) It is not the way you think it is, but procedure and table have different owners. Check the two objects in sys.objects, and check...
November 16, 2015 at 6:10 am
Glad to see that you got it working. Permit me, however, to point out that the solution was exactly what I was telling you. 🙂
November 5, 2015 at 10:11 am
Ed Wagner (11/4/2015)
I'm not sure what Erland means by the LoginUserW, but if it worked when you gave the login sysadmin privs, then we might be onto something.
LoginUserW comes from...
November 4, 2015 at 2:27 pm
Viewing 15 posts - 346 through 360 (of 1,219 total)