Viewing 15 posts - 121 through 135 (of 6,105 total)
As has been previously said, I'd look at a 3rd party product like Red Gate SQL Backup (full disclosure, I'm a Friend of Red Gate) because you can encrypt the...
April 16, 2012 at 4:54 pm
If the users aren't getting in via another security group, here's my recommendation:
1) remove the security group with the DENY. SQL Server is based on an explicit permission model. In...
April 16, 2012 at 2:22 pm
This can be done with proper use of cross-database ownership chaining. It's one of the few times you actually want to consider such an option. However, this isn't a simple...
April 12, 2012 at 7:48 pm
If your Windows domain already blocks re-use of the last three passwords, simply enable password policy enforcement on the logins. You'll accomplish the same thing without having to build anything....
April 5, 2012 at 12:15 pm
Also, SQL Server 2005 and above will honor the password policies that the OS has. It can't set its own. You can configure a SQL login to use these password...
April 5, 2012 at 9:33 am
Syslogin is not a real table. Just want to make that clear before we go forward. It doesn't affect anything, but if you're talking SQL Server 2005, you should be...
April 5, 2012 at 9:32 am
Can you detail the login security you set up for the linked server connections?
April 3, 2012 at 9:41 am
I believe this wording first showed up in the 2005 version of SQL Server. It may have to do with how the permissions work with respect to the schema securables.
April 3, 2012 at 9:36 am
MS DTC doesn't play into this, so that configuration is completely coincidental.
How are the two domains related? Same forest? Different forests? Parent-child domain?
April 3, 2012 at 9:35 am
apat (3/16/2012)
March 16, 2012 at 1:46 pm
Is there a DENY at the database or schema level where the table is?
March 16, 2012 at 1:17 pm
I'm not following here. You shouldn't never lose the database master key. You should be protecting it in accordance with the guidance in Books Online (BACKUP MASTER KEY). In this...
March 16, 2012 at 1:15 pm
You're going to need to use SQL Server authentication as you don't have a trusted relationship between the two systems. More here:
Books Online: Replication Security Best Practices
IP addressing is really...
March 16, 2012 at 1:11 pm
I'm adding on to what has already been said.
The key here is they have the ability to alter the stored procedure. In production, no developer should ever have the ability...
March 16, 2012 at 1:06 pm
Agreed, Denny's is the most recent in the field.
February 28, 2012 at 11:01 am
Viewing 15 posts - 121 through 135 (of 6,105 total)