O'Reilly logo

Microsoft® SQL Server 2012 Unleashed by Alex T. Silverstein, Chris Gallelli, Paul T. Bertucci, Ray Rankins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security for Database Snapshots

By default, you get the security roles and definitions that you have created in the source database available to you within the database snapshot except for roles or individual permissions that you have in the source database used for updating data or objects. This is referred to as “inherited from the source database.” These updating rights are not available to you in a database snapshot because a database snapshot is, by nature, read-only. If you have specialized roles or restrictions you want to be present in the database snapshot, you need to define them in the source database, and you get them instantly. You manage security from a single place, and everyone is happy.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required