Maintaining a User-Level Security Strategy
The majority of access to SQL Server takes place by users who need to perform queries that retrieve or update data. As a result, the user security policy that you adopt will likely change and evolve over time to meet the changing needs of your users.
SQL Server 2005 has expanded upon the security policies in previous versions in a number of ways. For one thing, schemas have been added, more granular permissions are available on objects, and new policies are available for accounts. The following sections will identify many of these changes and provide guidelines on how to best include them in your policy.
Verifying the Existence and Enforcement of Account Policies
SQL Server 2005 offers two authentication ...
Get MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance (70-444): Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.