Category Archives: Security

  1. The public role

    1

    May 23, 2018 by Kenneth Fisher

    A common misunderstanding is that the CONNECT permission lets you do more than just connect to a database. It doesn’t. …
    Continue reading

  2. Exploring permissions with sp_DBPermissions and sp_SrvPermissions : TSQL Tuesday 101

    1

    April 10, 2018 by Kenneth Fisher

    Our host for T-SQL Tuesday this month is Jens Vestergaard (b/t) and he has asked about our favorite SSMS tool. …
    Continue reading

  3. Double hop error when using SQLCMD

    2

    February 26, 2018 by Kenneth Fisher

    tl;dr; SQLCMD v2014 and up has special requirements for Kerberos. One of the problems with linked servers (no rude noises …
    Continue reading

  4. SQL Homework – February 2018 – Work with security

    Leave a comment

    February 5, 2018 by Kenneth Fisher

    This month let’s create some security! Create logins: GUI 5 pts/Script 5 pts Create a SQL login and a Windows …
    Continue reading

  5. What’s dbo?

    3

    January 22, 2018 by Kenneth Fisher

    Don’t you hate it how certain words (well, acronyms in this case) get reused to mean multiple things? dbo seems …
    Continue reading

  6. Who should own the database?

    6

    January 15, 2018 by Kenneth Fisher

    TL;DR; SA, or if you are really paranoid then you can create a disabled SQL login with minimal permissions and …
    Continue reading

  7. A Solution for Squirrely SQL Server Security: TSQL Tuesday #98

    Leave a comment

    January 9, 2018 by Kenneth Fisher

    It’s the first T-SQL Tuesday of the year! Arun Sirpal (b/t) is our host this month. Thanks, Arun! The subject …
    Continue reading

  8. What is impersonation for?

    3

    December 27, 2017 by Kenneth Fisher

    I was doing some research on impersonation the other day, and among other things, I ran across a forum question …
    Continue reading

  9. When do usernames and passwords belong in connection strings

    Leave a comment

    December 18, 2017 by Kenneth Fisher

    tl;dr: When using a windows or active directory authenticated id you do not put the username or password into your …
    Continue reading

  10. Restrict the usage of a SQL Server Authenticated Application Id

    1

    December 6, 2017 by Kenneth Fisher

    SQL Server login ids may not be the most secure thing in the world but they are likely to be …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,424 other followers

Follow me on Twitter

ToadWorld Pro of the Month November 2013