Security

External Article

SQL Server Impersonation

  • Article

SQL Server impersonation, or context switching, is a means to allow the executing user to assume the permissions of a given user or login until the context is set back, set to yet another user, or the session is ended. Deanna Dicken shows you two mechanisms for accomplishing this task and walks through some examples.

2010-02-25

2,388 reads

SQLServerCentral Article

Using a Certificate Signed Stored Procedure to Execute sp_send_dbmail

  • Article

Learn how to create a certificate signed stored procedure to solve common permissions problems using sp_send_dbmail. MVP Jonathan Kehayias brings us a short tutorial that discusses your options and code to show you how to implement certificate security.

4.81 (36)

You rated this post out of 5. Change rating

2009-12-17

10,391 reads

External Article

SQL Server Security Audit Report

  • Article

If your company needs to go through a SOX (Sarbanes–Oxley) audit or any security audit, the DBA has to provide security information to them. If you have purchased third party tools to provide this information that is great. If you don't have third party tools and need to go through many servers to provide this information it can be a hassle and very time consuming. So I put together a script to generate a report that I could just review. The script generates a report of all elevated level accounts and any possible security holes.

2009-11-20

3,602 reads

External Article

Grant Execute Permissions to Stored Procedures using DDL Triggers

  • Article

In your development environment if you have locked down permissions for developers, but still need them to execute stored procedures you will need to grant execute rights each time a new stored procedure is generated. In this tip I will show you a way of doing this automatically each time a new stored procedure is created without granting your developers additional permissions.

2009-11-13

3,474 reads

External Article

Options for hiding SQL Server code

  • Article

I am aware of the WITH ENCRYPTION clause that is used to encrypt the code for objects like views, stored procedures and functions. It sort of fulfills my purpose and is easy to implement, but it does not cover all SQL Server objects. In this tip we look at another option to restrict users from viewing the definition/code of any SQL Server object.

2009-09-08

5,538 reads

Blogs

A Couple Quick GENERATE_SERIES Tests

By

I had someone reach out about generate_series() recently, saying they hadn’t realized this was...

How I passed the DP-700 Exam

By

I recently took and passed the DP-700 exam, which is required for the Microsoft...

Which approach to take: Build it, buy it, cloud it?

By

As a Consultant, I would typically answer with – it depends! Then a typical...

Read the latest Blogs

Forums

Dynamic T-SQL Script Parameterization Using Python

By omu

Comments posted to this topic are about the item Dynamic T-SQL Script Parameterization Using...

How to Download and Restore AdventureWorks 2019 Database

By Noman072

Comments posted to this topic are about the item How to Download and Restore...

Tracking Table Sizes

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Tracking Table Sizes

Visit the forum

Question of the Day

Counting Bits IV

What does this code return in SQL Server 2022+?

select bit_count(2.4)
 

See possible answers