Viewing 15 posts - 406 through 420 (of 1,219 total)
Run these querie:
SELECT * FROM sys.database_permissions WHERE state_desc = 'DENY'
SELECT * FROM sys.server_permissions WHERE state_desc = 'DENY'
And then dig further from the appropriate DENY that you find.
December 1, 2014 at 4:45 am
The question is not very clear, but EXECUTE AS is a non-starter. Sign the procedure with a certificate and create a login from the certificate and grant that login the...
November 26, 2014 at 3:31 pm
No, that's not the ticket. The certificate user is only there to tie the cert to the permissions. It has nothing to do with the application.
As I said, this error...
November 25, 2014 at 8:41 am
You can grant EXECUTE permissions on schema level:
GRANT EXECUTE ON SCHEMA::dbo TO someone
or on database level:
GRANT EXECUTE TO someone
November 25, 2014 at 8:29 am
It sounds as if you have an EXECUTE AS somewhere in your procedures or functions. When you impersonate a database user you are sandboxed into the current database. This is...
November 25, 2014 at 8:28 am
There are a couple of possibilities. The best is to sign the functions with a certificate which exists in both databases. In the other database, you create user from the...
November 24, 2014 at 3:21 pm
I'm not sure that this is an SQL Server question, since your problem seems to be with running IIS. But if they are connecting to SQL Server through a web...
November 11, 2014 at 6:05 am
Books Online seems to be quite clear that DATABASE_OBJECT_CHANGE_GROUP applies to any databas, and there is a warning that this can result in large logs.
As for the question of model,...
October 31, 2014 at 9:11 am
russc-993845 (10/29/2014)
October 29, 2014 at 10:04 pm
russc-993845 (10/29/2014)
October 29, 2014 at 9:48 pm
My first attempt would be
ALTER LOGIN guesser ENABLE
Then again, it may be the fact that the guy is login which prevents UNLOCK from working.
October 22, 2014 at 12:55 pm
Server side trace with SP:StmtStarting and SQL:StmtStarting with the filter TextData like %xp_cmdshell% seems like the only alternative. Ot the corresponding X-event session on SQL 2012 or later.
October 11, 2014 at 11:44 am
If you look up the documentation for sys.database_principals and similar catalog view, you will find that the type for name is sysname, that is nvarchar(128). This is also the return...
September 24, 2014 at 1:25 pm
The attacks are coming on the port on which SQL Server is listening on. Which you can see in SQL Server Configuration Manager and also in the beginning of the...
September 23, 2014 at 12:58 pm
Viewing 15 posts - 406 through 420 (of 1,219 total)