SQL Server security – Providing a security model using user-defined roles
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Security roles can simplify permissions in SQL Server. In this article, Greg Larsen explains fixed server and database roles.
2021-04-22
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
Learn how to manage and troubleshoot Kerberos authentication for SQL Server using the Kerberos Configuration Manager.
2021-03-30
Phil Factor demonstrates how to use Extended Events to detect acquisition of Intent locks, and so determine which databases are active or apparently 'dormant', and then on which tables data has been modified recently, or which views and stored procedures have been run.
2021-01-28
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
2020-10-01
A colleague left the company, a couple of days after SQL Server processes start failing...what do you do?
2020-09-29
6,356 reads
If you own a database with encrypted modules but you don't have a decrypted version, this can be a horror story.
Learn how to get back the code of the encrypted modules using dbatools.
2020-08-18
2,948 reads
Being able to get information and save it on a Excel as a report can be a common and tedious task. What if we could join dbatools and ImportExcel PorwerShell modules to accomplish this in a easier and fast way? We will see how to export roles and its' member and save that info on a multi spreadsheet Excel file with handy tables ready to be explored.
2020-06-30
6,949 reads
SQL Server Machine Learning allows you to run R and Python scripts from SQL Server. When SQL Server 2019 was released, Microsoft enhanced the security for this functionality, but it caused some existing code writing to the file system to to break. In this article, Dennes Torres explains the security enhancement and describes three ways to work with it.
2020-03-11
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers