IT tutorials
 
Database
 

SQL Server 2012 : Authorizing Securables - A Sample Security Model

1/2/2014 3:11:27 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

A Sample Security Model

The simplest way to assign permissions when more granularity is needed is to create user-defined roles and select effective permissions. Tables 1 and 2 list sample user-defined roles and user permission settings of the user-defined database roles. Table 2 lists a few of the users and their roles.

Table 1 Sample User-Defined Role Permission Assignment

c33tnt002

Table 2 Sample User and Windows Group Role Assignments

User / Windows Group Database Roles
Sam Admin
John Public
Larry DBTeam
Clerks (Betty, Tom, Martha, and Mary) DataEntry

From this security model, the following users can perform the following tasks:

  • Betty, as a member of the Clerks Windows group assigned to the DataEntry user-defined role, can execute the application that executes stored procedures to retrieve and update data. Betty can run select queries as a member of the Public role.
  • Larry, as part of the DBTeam user-defined role, can perform any task in the database as a member of the sysadmin server role.
  • John cannot connect, read, or write data to any database by default as a member of the public role.
  • As a member of the Admin role, Sam can execute all stored procedures. He can also manually modify any table using queries.
  • Only Larry has unrestricted access to the database server, which includes the ability to modify server and database roles and permission assignments.

Views and Security

A popular, but controversial, method to design security is to create a view that exposes only certain columns, or that restricts the rows with a WHERE clause and a WITH Check Option, and then grants permission to the view to allow users limited access to data. Some IT shops require that all access goes through such a view.

Those opposed to using views for a point of security have several good reasons:

  • Views are not compiled or optimized.
  • Column-level security can be applied with user-defined SQL Server security.
  • Using views for row-level security means that the WITH CHECK OPTION must be manually created with each view. As the number of row-level categories grows, it can become cumbersome to do this type of manual maintenance.
 
Others
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us