Forum Replies Created

Viewing 15 posts - 421 through 435 (of 1,219 total)

  • RE: Alternative to xp_cmdshell

    xp_cmdshell does not generate any text file in itself, but you run something from xp_cmdshell that generates a text file.

    You could just as well as run the same thing from...

  • RE: How to create a login with default database role "db_datareader"

    It seems like you want to create a user that should only see the databases on the server it has access to. This is unfortunately not possible. You can make...

  • RE: Access required to grant fixed role membership to database user<!-- 864 -->

    So what does this team need to do, which is not covered by db_securityadmin and db_accessadmin? Without this information, your question is somewhat difficult to answer.

    I note in Books Online...

  • RE: Brute Force Attacks

    They are all coming on the port on which SQL Server is listening on. You can see this in the SQL Server Configuration Manager or in the beginning of the...

  • RE: Brute Force Attacks

    TomThomson (8/17/2014)


    Erikur's advice is all good.

    Erikur?

  • RE: Brute Force Attacks

    If SQL Server is only serving the web server, it's simple: make sure that only ports 80 and 443 are open in the firewall. And particularly, make sure that the...

  • RE: Brute Force Attacks

    You should be concerned, and you should not expose you SQL Server instance on the internet. As long as it is, you should keep the sa account disabled. Renaming it,...

  • RE: Cross database view/table permissions

    So there is something you are not telling us. Here is a script that you can play with, that shows how it works with DB_CHAINING. (Note that you don't need...

  • RE: Cross database view/table permissions

    For DB_CHAINING to work the two databases must have the same owner.

    For TRUSTWORTHY to work, the databases must either have the same owner, or the owner of the database where...

  • RE: Denying Job Access in SSMS?

    Andrew Kernodle (8/5/2014)Unfortunately, I'm not quite sure how to prohibit him from doing this. I've revoked the sysadmin role on his login (he doesn't need that much access anyhow),...

  • RE: Read only user for security users in a database

    Add the user to db_datareader, and grant the user VIEW DEFINITION on database level:

    GRANT VIEW DEFINITION TO nisse

    Note that this gives the user right to see any definition in the...

  • RE: Get next primary key without identity

    Eirikur Eiriksson (8/2/2014)


    Quick thought, transactional behaviour does not alter the SEQUENCE but it can muffle IDENTITY entries, leaving gaps.

    😎

    No, sequences and IDENTITY behave the same in this regard:

    CREATE SEQUENCE MySeq...

  • RE: Get next primary key without identity

    Jeff Moden (8/2/2014)


    I agree that SEQUENCE has the advantage of being able to cover multiple tables and that IDENTITY requires SET IDENTITY INSERT if you want to update the identity...

  • RE: Get next primary key without identity

    Jeff Moden (8/2/2014)


    The best thing to do is to NOT try to write your own NextID sequencer. Use IDENTITY or SEQUENCE They won't let you down except for...

  • RE: Get next primary key without identity

    Evil Kraig F (8/1/2014)


    You're in SQL 2014, and want to select an INT. Have you looked at SEQUENCE? It does exactly that.

    Beware that sequence can give you gaps....

Viewing 15 posts - 421 through 435 (of 1,219 total)