Chapter 25. SQL Server security

After completing this chapter, you will be able to

  • Understand the SQL Server security model.

  • Understand principals.

  • Create SQL Server logins and users.

  • Create user-defined server roles.

  • Create database users.

  • Create built-in database roles.

  • Configure a contained database.

No matter if you work for a university, a bank, or a retail store, securing data is always a database administrator’s (DBA’s) top priority. Who can access the data, what data they can access, and how to access the data are often main topics of conversation inside and outside the information technology (IT) department. Data access needs will vary across applications, departments, and individuals, but the underlying requirement of governing permissions persists ...

Get Microsoft® SQL Server® 2012 Step by Step now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.