THE SQL Server Blog Spot on the Web

Welcome to - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » sql server » Security   (RSS)
Showing page 2 of 2 (13 total posts)
  • SQL Server Best Practices: Use Roles When You Can

    SQL Server has two major security vectors: “Principals”, which are primarily users and roles (groups), and “Securables”, which are primarily objects on the server or in the database, like tables or views. Many applications use Logins for their users, and then tie those Instance Logins to Database Users. The Database Users are then given rights and ...
    Posted to Buck Woody (Weblog) by BuckWoody on December 7, 2009
  • Fifth pillar - Secure

    As I have mentioned in all of the previous posts, basic functionality is the foundation of any system. So it goes without saying that if you have just implemented a payroll system, everyone is getting paid.  To meet the basic bar that EVERYONE agrees upon, to be useful things have to work. Frankly, this is generally the only criteria which ...
    Posted to Louis Davidson (Weblog) by drsql on October 6, 2009
  • An open letter to all 3rd-party vendors: DO NOT USE SA ANYWHERE IN YOUR APPLICATION

    I've run into this problem again and again. Sometimes I've had luck in convince clients that if a 3rd-party application is hard-coded to use SA is shouldn't even be considered. Sometimes not. With all of the issues that have come up with the SA account over the last 10 years, I find it inexcusable that vendors still hard-code their application to ...
    Posted to James Luetkehoelter (Weblog) by James Luetkehoelter on September 23, 2008
Privacy Statement