Solved

Ability to restrict user access to certain tables?

Posted on 2002-06-04
3
384 Views
Last Modified: 2008-03-06
Hi,

Does MS SQL Server 2000 have the ability to limit user access to certain tables in a database?

We have a client that is connecting to our db using VPN and loading data into some tables and retrieving data from other tables.  What we want to do is restrict them from seeing any other tables in our database.

Is this possible?  If so, how?

thanks
0
Comment
Question by:bsmiley
  • 2
3 Comments
 
LVL 5

Expert Comment

by:spcmnspff
ID: 7054561
Yes, this is possible.  If you add the user to the database but add them to any database roles, the user will not be able to select from any tables by default.  Now you can control permissions at the table level by granting them select permissions on certain tables

GRANT SELECT ON Table1 TO domain\user

or if your using a sql server login for the user:

GRANT SELECT ON Table1 TO userlogin

I imagine that your current configuration is such that the user has permissions to all the tables by virtue of membership to some server/database role - i.e. db_datareader. If so, you'll have to remove the user from that role first.
0
 
LVL 5

Accepted Solution

by:
spcmnspff earned 100 total points
ID: 7054562
Sorry let try that again:


Yes, this is possible.  If you add the user to the database but DON'T add them to any database roles, the
user will not be able to select from any tables by default.  Now you can control permissions at the
table level by granting them select permissions on certain tables

GRANT SELECT ON Table1 TO domain\user

or if your using a sql server login for the user:

GRANT SELECT ON Table1 TO userlogin

I imagine that your current configuration is such that the user has permissions to all the tables by
virtue of membership to some server/database role - i.e. db_datareader. If so, you'll have to remove
the user from that role first.
0
 

Author Comment

by:bsmiley
ID: 7054589
Thanks!

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Performance is the key factor for any successful data integration project, knowing the type of transformation that you’re using is the first step on optimizing the SSIS flow performance, by utilizing the correct transformation or the design alternat…
Ever wondered why sometimes your SQL Server is slow or unresponsive with connections spiking up but by the time you go in, all is well? The following article will show you how to install and configure a SQL job that will send you email alerts includ…
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.
Viewers will learn how to use the SELECT statement in SQL and will be exposed to the many uses the SELECT statement has.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now