Category Archives: Security

  1. Windows Hello may cause a “SSPI Context” error

    2

    August 22, 2023 by Kenneth Fisher

    I’m going to start out by saying I don’t know a tremendous amount about this subject. I’ll tell you what …
    Continue reading

  2. db_ddladmin Jr.

    1

    July 20, 2023 by Kenneth Fisher

    A while back I talked about the fact that you can grant someone CREATE PROCEDURE and ALTER on a schema …
    Continue reading

  3. How do I tell if a user is orphaned or actually created without a login?

    5

    July 18, 2023 by Kenneth Fisher

    One of the wonderful things about blogging is the ability to make notes for future me. Which is basically what …
    Continue reading

  4. The two hardest concepts of security are Who? and Where?

    3

    July 13, 2023 by Kenneth Fisher

    I was having a conversation with some friends the other day and Jen McCown (blog|twitter) asked about SQL Server security …
    Continue reading

  5. What you can do is based on more than your direct permissions.

    1

    October 6, 2022 by Kenneth Fisher

    What you have access to is not just what you have direct permissions to. The other day I needed to …
    Continue reading

  6. Viewing errors with extended events

    3

    September 27, 2022 by Kenneth Fisher

    A little while back I came across this post: Identifying failed queries with extended events. It has a script to …
    Continue reading

  7. Creating a SERVER ROLE created a LOGIN as well.

    1

    September 6, 2022 by Kenneth Fisher

    One of my co-workers came to me the other day and told me that they found their network id as …
    Continue reading

  8. Why is security important in a dev environment?

    10

    August 23, 2022 by Kenneth Fisher

    I was asked a rather interesting question during an interview recently. It went something like this: Your resume says you’ve …
    Continue reading

  9. New parameter in sp_DBPermissions and sp_SrvPermissions: @CopyTo

    Leave a comment

    August 18, 2022 by Kenneth Fisher

    I’ve added a new parameter to my permissions scripts (well, just the main two for now). Fair warning, it’s in …
    Continue reading

  10. EXECUTE AS USER vs EXECUTE AS LOGIN

    1

    July 26, 2022 by Kenneth Fisher

    I use impersonation a lot. It’s a really easy way to check if someone has the permissions they are supposed …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 6,756 other subscribers

Follow me on Twitter

Archives

ToadWorld Pro of the Month November 2013