Solved

SQL 2005

Posted on 2009-05-13
3
209 Views
Last Modified: 2012-05-06
I read where you need to use a Schema for Security Mgt in SQL 2005. Can someone briefly explain that to me? I am confused as to whether I set up a Role or Schema to manage a group of users.
Thansk
0
Comment
Question by:SeTech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Expert Comment

by:Aanvik
ID: 24379060
schema are defined at db level . Like you can have multiple schema's to store different groups of tables... For example dbo, Arch (to store archived tables), etc.

Roles are attached with users and may have permission to different objects in database.

http://www.sqlteam.com/article/understanding-the-difference-between-owners-and-schemas-in-sql-server 
0
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24379507
In a nutshell a schema is an object owner.

You create a schema; say SETech; Any object which you create would then becone SETech.tbl_MyTable.

It allows for a more granular approach to security.

HTH
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Mark Wills PIVOT is a great facility and solves many an EAV (Entity - Attribute - Value) type transformation where we need the information held as data within a column to become columns in their own right. Now, in some cases that is relatively…
Introduction This article will provide a solution for an error that might occur installing a new SQL 2005 64-bit cluster. This article will assume that you are fully prepared to complete the installation and describes the error as it occurred durin…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question