THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » Security   (RSS)
Showing page 3 of 3 (25 total posts)
  • DrillThrough Actions and (semi) Security in SSAS OLAP cubes

    Using SSAS 2005/2008, there is no way to apply security to DRILLTHROUGH actions, so we cannot decide whether a specific user is authorized or not to perform a specific action. This is a “by design” behavior, since DRILLTHROUGH actions are initiated at the client side, we can decide whether a user can perform or not DRILLTHROUGH but, once we let ...
    Posted to Alberto Ferrari (Weblog) by AlbertoFerrari on June 24, 2009
  • Granting rights to all objects in a database

    File this under the “I can’t believe there is still stuff that I keep learning about SQL Server 2005!” though thankfully most things I find I learn are things I wouldn’t be all that likely to use. I was asked today how I felt about using the syntax: GRANT EXECUTE TO [username] to give users rights to all procedures in the database (and you ...
    Posted to Louis Davidson (Weblog) by drsql on March 13, 2009
  • You HAVE to Trust, you MUST Verify -and that may still not be enough!

    In Brian Kelly's recent blog post, he makes an excellent case outlining why there are few options but to 'Trust' SQL Server Administrators. And then he goes into excellent detail explaining that it may be impossible to completely 'prohibit' disruptive behavior, and that one should establish a robust auditing of security events. And it is not ...
    Posted to Arnie Rowland (Weblog) by ArnieRowland on February 20, 2009
  • Troubleshooting login problems

    I've been learning a few things about troubelshooting login problems over the last few months. I first want to say that I've learned most of this through other blogs, comments etc. At the end of this blog post you will find an URL list where you can look for more details. It started a few months back where I somewhere read a blog stating that we ...
    Posted to Tibor Karaszi (Weblog) by TiborKaraszi on December 17, 2008
  • Xp_cmdshell and permissions

    This blog post was inspired from a newsgroup discussion. The question basically is:What do you need to do in order to use xp_cmdshell? Note that there are obvious security implications of doing this. (I'm not recommending usage of xp_cmdshell in general, this is a technical blog post!) We first need to think about what happens here, from an ...
    Posted to Tibor Karaszi (Weblog) by TiborKaraszi on August 23, 2007
Privacy Statement