O'Reilly logo

Microsoft by Hilary Cotter, Ross Mistry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9 Administering SQL Server Security and Authorization

By maintaining a strategy that is secure by design, secure by default, and secure in deployment, SQL Server 2008 allows for a much more effective method of design, implementation, and administration of security across resources and services provided by the SQL environment. Security permissions can be defined on a wide range of objects, from network endpoints that facilitate client communication, to execute permissions on a stored procedure, even down to the column level within a table. Complex security implementations can be efficiently controlled with granular role-based authorization and database schemas.

Administering SQL security is a key database administrator task that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required