Solved

SQL Server Permissions and descriptions

Posted on 2009-05-06
2
178 Views
Last Modified: 2012-05-06
Hello Experts,

I have listed the SQL SERVER level securables in SQL Server.  I would like to gain a better understanding of what each component does.  Please provide details or reference to a "plain-English" description.

Kind regards,
IC
CONNECT SQL
SHUTDOWN
CREATE ENDPOINT
CREATE ANY DATABASE
ALTER ANY LOGIN
ALTER ANY CREDENTIAL
ALTER ANY ENDPOINT
ALTER ANY LINKED SERVER
ALTER ANY CONNECTION
ALTER ANY DATABASE
ALTER RESOURCES
ALTER SETTINGS
ALTER TRACE
ADMINISTER BULK OPERATIONS
AUTHENTICATE SERVER
EXTERNAL ACCESS ASSEMBLY
VIEW ANY DATABASE
VIEW ANY DEFINITION
VIEW SERVER STATE
CREATE DDL EVENT NOTIFICATION
CREATE TRACE EVENT NOTIFICATION
ALTER ANY EVENT NOTIFICATION
ALTER SERVER STATE
UNSAFE ASSEMBLY
CONTROL SERVER

Open in new window

0
Comment
Question by:IClown
2 Comments
 
LVL 41

Expert Comment

by:pcelba
ID: 24320512
Wow. Did you try Google? Or SQL Server help available on-line.

e.g. VIEW SERVER STATE is discussed here http://social.msdn.microsoft.com/forums/en-US/sqlsecurity/thread/3c0182b2-dc24-47c8-bbb9-e36c911a3a45/

etc.

If you have specific problem with some from above commands, just ask a question here. But don't ask for SQL manual reproduction. It is contraproductive both for experts and for you. Sorry.
0
 
LVL 57

Accepted Solution

by:
Raja Jegan R earned 50 total points
ID: 24320529
Hope this helps:

http://www.mssqltips.com/tip.asp?tip=1718
http://msdn.microsoft.com/en-us/library/ms187965(SQL.90).aspx

Navigate through the links available in second reference for more details
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There have been several questions about Large Transaction Log Files in SQL Server 2008, and how to get rid of them when disk space has become critical. This article will explain how to disable full recovery and implement simple recovery that carries…
INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question