Category Archives: Impersonation

  1. The trials and tribulations of REVERTing from impersonation

    1

    May 16, 2018 by Kenneth Fisher

    Impersonation is a highly useful tool in your toolbox. With the EXECUTE AS clause you can allow your stored procedure …
    Continue reading

  2. Who should own the database?

    6

    January 15, 2018 by Kenneth Fisher

    TL;DR; SA, or if you are really paranoid then you can create a disabled SQL login with minimal permissions and …
    Continue reading

  3. What is impersonation for?

    3

    December 27, 2017 by Kenneth Fisher

    I was doing some research on impersonation the other day, and among other things, I ran across a forum question …
    Continue reading

  4. Using impersonation to allow a task without granting the required permission.

    9

    August 1, 2016 by Kenneth Fisher

    I use impersonation on a regular basis for a number of different tasks. This one is pretty basic but can …
    Continue reading

  5. Impersonation can give you the wrong answer

    1

    February 8, 2016 by Kenneth Fisher

    I use impersonation all the time to let me see additional permissions information I can only get that way and, …
    Continue reading

  6. Impersonating a server level permission

    9

    February 26, 2014 by Kenneth Fisher

    Warnings up front, this has some serious security implications. The method I’m going to use minimizes that somewhat but it’s …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,469 other followers

Follow me on Twitter

ToadWorld Pro of the Month November 2013