Solved

execution context - token

Posted on 2010-08-12
3
535 Views
Last Modified: 2012-05-10
Hi experts, i am reading about execution context, but i don't understand a login token ( sys.login_token)  and a user token(sys.user_token).
I need an example (like a hands on lab) in which they explain the diference between these two token
0
Comment
Question by:enrique_aeo
3 Comments
 
LVL 9

Assisted Solution

by:Sreedhar Vengala
Sreedhar Vengala earned 100 total points
ID: 33425747
Look into this http://www.sommarskog.se/grantperm.html got details explanation of sys.login_token and sys.user_token
0
 

Author Comment

by:enrique_aeo
ID: 33431519
Please experts, I need something more precise, an example would be excellent transact sql
0
 
LVL 59

Accepted Solution

by:
Kevin Cross earned 400 total points
ID: 33433293
Run this on your system :

-- http://technet.microsoft.com/en-us/library/ms186740.aspx
select *
from sys.login_token;

And read the Technet link and should help as you will see this is as the site says a listing of credentials including their type (Windows, SQL Server, etc.), their principal id, sid, etc.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Audit has been really one of the more interesting, most useful, yet difficult to maintain topics in the history of SQL Server. In earlier versions of SQL people had very few options for auditing in SQL Server. It typically meant using SQL Trace …
Ever needed a SQL 2008 Database replicated/mirrored/log shipped on another server but you can't take the downtime inflicted by initial snapshot or disconnect while T-logs are restored or mirror applied? You can use SQL Server Initialize from Backup…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now