Tag Archives: security
-
What is impersonation for?
3December 27, 2017 by Kenneth Fisher
I was doing some research on impersonation the other day, and among other things, I ran across a forum question …
Continue reading -
When do usernames and passwords belong in connection strings
Leave a commentDecember 18, 2017 by Kenneth Fisher
tl;dr: When using a windows or active directory authenticated id you do not put the username or password into your …
Continue reading -
Restrict the usage of a SQL Server Authenticated Application Id
1December 6, 2017 by Kenneth Fisher
SQL Server login ids may not be the most secure thing in the world but they are likely to be …
Continue reading -
UDP vs TCP
3June 7, 2017 by Kenneth Fisher
If you’ve worked much with named instances you’ve probably had to deal with the question “What port is that instance …
Continue reading -
Why is a Windows authenticated login more secure than a SQL authenticated one?
12April 26, 2017 by Kenneth Fisher
I had this question come up at work the other day and while I knew it was true I wasn’t …
Continue reading -
Server level database permissions
4February 14, 2017 by Kenneth Fisher
Sometimes you have a requirement to grant permissions to every database on an instance. Historically this has required creating a …
Continue reading -
My SQL logins don’t work. Again.
Leave a commentJanuary 25, 2017 by Kenneth Fisher
My recent post on why SQL logins aren’t working has generated a couple of follow up posts. The first one …
Continue reading -
Why won’t my SQL Logins work?
11January 12, 2017 by Kenneth Fisher
I recently had an interesting time getting the SQL Auth logins on a new instance working. I was doing a …
Continue reading





