Chapter 12Administering security and permissions

In this chapter, we are going to look at how to implement security when it comes to accessing the data in your databases, starting with authenticating who you are, what you can access, and what you can do with the data once you have access. Many of these principles will apply equally to SQL Server and Microsoft Azure SQL based offerings; but there are some differences due to the fundamental nature of each services.

The chapter will start out covering the modes of authenticating who the entity is that is trying to access the database. There are several authentication modes that you can use to access the ...

Get SQL Server 2019 Administration Inside Out now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.