Solved

Security Report

Posted on 2001-09-07
1
226 Views
Last Modified: 2012-05-04
We have to generate a report of who has what access to what tables in a database that contains confidential information.  I have go it to the point of seeing what roles can see what obects by using sysobjects, sysusers and syspermissions.  Now can I get it to show what access each of the roles have to the tables.   I see the binary columns (seladd,selmod) in the syspermission tables but I can not select them because they just return null.   Is there some way that I can get what I need out of SQL server?
0
Comment
Question by:curtis591
1 Comment
 
LVL 3

Accepted Solution

by:
mathavra earned 50 total points
ID: 6465565
Have you tried sp_helprotect store procedure. It gives necessary output for the whole database if you do not pass any "objectname" or "username".

If you want to find out how to convert the binary values from seladd, selmod column, look at the code in sp_helprotect procedure code. It uses a table called "spt_values" in master to convert them.

Hope this helps.

Mathav
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction SQL Server Integration Services can read XML files, that’s known by every BI developer.  (If you didn’t, don’t worry, I’m aiming this article at newcomers as well.) But how far can you go?  When does the XML Source component become …
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Via a live example, show how to extract information from SQL Server on Database, Connection and Server properties
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question