Security

Technical Article

Database Activity Monitoring Part 2 - SQL Injection Attacks

  • Article

If you think through the web sites you visit on a daily basis the chances are that you will need to login to verify who you are. In most cases your username would be stored in a relational database along with all the other registered users on that web site. Hopefully your password will be encrypted and not stored in plain text.

2010-03-10

3,893 reads

External Article

Using a Parent Child Hierarchy in SQL Server to Implement a Custom Security Scheme

  • Article

I have a requirement to implement a custom security scheme where roles and the user's place in the organization hierarchy are used to determine which customers a user can access. In particular the requirements are that a sales person can only access their customers and any other role can access any customer in their level of the organization hierarchy and below. We have a simple hierarchy that is made up of regions and offices. Can you provide us with an example of how to do this?

2010-03-01

3,410 reads

External Article

SQL Server Impersonation

  • Article

SQL Server impersonation, or context switching, is a means to allow the executing user to assume the permissions of a given user or login until the context is set back, set to yet another user, or the session is ended. Deanna Dicken shows you two mechanisms for accomplishing this task and walks through some examples.

2010-02-25

2,388 reads

SQLServerCentral Article

Using a Certificate Signed Stored Procedure to Execute sp_send_dbmail

  • Article

Learn how to create a certificate signed stored procedure to solve common permissions problems using sp_send_dbmail. MVP Jonathan Kehayias brings us a short tutorial that discusses your options and code to show you how to implement certificate security.

4.81 (36)

You rated this post out of 5. Change rating

2009-12-17

10,423 reads

External Article

SQL Server Security Audit Report

  • Article

If your company needs to go through a SOX (Sarbanes–Oxley) audit or any security audit, the DBA has to provide security information to them. If you have purchased third party tools to provide this information that is great. If you don't have third party tools and need to go through many servers to provide this information it can be a hassle and very time consuming. So I put together a script to generate a report that I could just review. The script generates a report of all elevated level accounts and any possible security holes.

2009-11-20

3,602 reads

External Article

Grant Execute Permissions to Stored Procedures using DDL Triggers

  • Article

In your development environment if you have locked down permissions for developers, but still need them to execute stored procedures you will need to grant execute rights each time a new stored procedure is generated. In this tip I will show you a way of doing this automatically each time a new stored procedure is created without granting your developers additional permissions.

2009-11-13

3,474 reads

Blogs

Why use XACT_ABORT?

By

This came up one day at my work when a developer was using it....

Using AI for Data Conversion

By

I’m sure I’ve never mentioned that I’m an amateur radio operator. Like Vegans and...

Advice I Like: Tipping

By

When in doubt, overtip – from Excellent Advice for Living This is close to...

Read the latest Blogs

Forums

Two Events, Two Worlds: A Week in the Life of a Technologist

By dbakevlar

Comments posted to this topic are about the item Two Events, Two Worlds: A...

Installing SQL Instance on a Clustered Virtual Disk

By bokswager

Hi Everyone, I have a question, I am trying to setup a Lab environment...

Upgrades to SQL Server 2022

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Upgrades to SQL Server 2022

Visit the forum

Question of the Day

Upgrades to SQL Server 2022

What is the earliest version from which you can directly upgrade to SQL Server 2022?

See possible answers