Viewing 15 posts - 16 through 30 (of 45 total)
As said in previous posts, using staging servers can be a great first step; but I would add formal policies in the mix so that developers understand how serious the...
August 13, 2007 at 12:13 pm
Hi Marc,
I am not too sure about the internals of Access regarding linked servers, but it sounds to me that the issue is related to the way the credentials are...
August 13, 2007 at 12:00 pm
Another approach would be to use 2 factor authentication for SQL Server - the logins would be database logins but hard tokens could be used to secure the logins and...
July 27, 2007 at 5:36 pm
Interesting question... not all Proxies can forward SQL connection requests.
I only of two products that can be used as proxies - ISA Server and Enzo DB Firewall.
Were you...
July 27, 2007 at 5:31 pm
Hello,
SQL Server uses the OS security subsystem to provide network authentication. If you use a local windows account, NTLM will be used - not Kerberos.
If you use a domain account...
July 27, 2007 at 5:26 pm
Hi Goodguy,
In short, you can't. Sorry for the bad news...
Instead what other vendors do is keep a hash of their data structures and...
June 27, 2007 at 9:56 am
What if you add WITH RECOMPILE at the end of the procedure? I would be interested to know if you still get the same result with this option.
June 22, 2007 at 9:53 pm
Windows Authentication is more secure by design. Creating database accounts basically creates shared accounts. Not to mention that it's pretty easy to sniff the network and find database account passwords when...
June 12, 2007 at 7:16 pm
I am not sure what the objective is, but if all you want is a way to know which database hasn't been used in a while just look into sysprocesses...
June 9, 2007 at 6:21 pm
Strange indeed... what version of SQL Server are you using? What version of the ODBC driver are you using? Also - do you have anything in the event log on...
June 9, 2007 at 1:18 pm
You could setup a trace on Login events, store the events in a table and create a trigger on the table. The trigger can perform pretty whatever you want, including kicking off...
June 9, 2007 at 1:11 pm
You may need an authentication proxy to control who can use TOAD or Access and from where.
If you can't change the application UID, then you may need to create a separate database...
June 9, 2007 at 1:01 pm
Well, this is a rather complex requirement... Let me take a shot at this. I am assuming you are looking for an integrated solution as opposed to a simple backup/restore...
June 8, 2007 at 10:00 pm
Technically if your users are connecting through VPN using their network account (as they should) they should be able to connect to SQL Server as usual.
Windows Authentication should work seemlessly.
If...
June 8, 2007 at 9:45 pm
Hi - If I understand your question you are trying to find out if you can identify who is using the 'sa' account and from where.
There is a solution out...
February 11, 2007 at 12:53 pm
Viewing 15 posts - 16 through 30 (of 45 total)