Solved

SQL 2005

Posted on 2009-05-13
3
208 Views
Last Modified: 2012-05-06
I read where you need to use a Schema for Security Mgt in SQL 2005. Can someone briefly explain that to me? I am confused as to whether I set up a Role or Schema to manage a group of users.
Thansk
0
Comment
Question by:SeTech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Expert Comment

by:Waynepre
ID: 24379055
0
 
LVL 5

Expert Comment

by:Aanvik
ID: 24379060
schema are defined at db level . Like you can have multiple schema's to store different groups of tables... For example dbo, Arch (to store archived tables), etc.

Roles are attached with users and may have permission to different objects in database.

http://www.sqlteam.com/article/understanding-the-difference-between-owners-and-schemas-in-sql-server 
0
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24379507
In a nutshell a schema is an object owner.

You create a schema; say SETech; Any object which you create would then becone SETech.tbl_MyTable.

It allows for a more granular approach to security.

HTH
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to use TOP 1 in a T-SQL sub-query? 14 54
Query to Add Late Tolerance 10 86
Need to find substring in SQL 5 52
Using this function 4 54
If you having speed problem in loading SQL Server Management Studio, try to uncheck these options in your internet browser (IE -> Internet Options / Advanced / Security):    . Check for publisher's certificate revocation    . Check for server ce…
In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question