?
Solved

execution context - token

Posted on 2010-08-12
3
Medium Priority
?
547 Views
Last Modified: 2012-05-10
Hi experts, i am reading about execution context, but i don't understand a login token ( sys.login_token)  and a user token(sys.user_token).
I need an example (like a hands on lab) in which they explain the diference between these two token
0
Comment
Question by:enrique_aeo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Assisted Solution

by:Sreedhar Vengala
Sreedhar Vengala earned 400 total points
ID: 33425747
Look into this http://www.sommarskog.se/grantperm.html got details explanation of sys.login_token and sys.user_token
0
 

Author Comment

by:enrique_aeo
ID: 33431519
Please experts, I need something more precise, an example would be excellent transact sql
0
 
LVL 60

Accepted Solution

by:
Kevin Cross earned 1600 total points
ID: 33433293
Run this on your system :

-- http://technet.microsoft.com/en-us/library/ms186740.aspx
select *
from sys.login_token;

And read the Technet link and should help as you will see this is as the site says a listing of credentials including their type (Windows, SQL Server, etc.), their principal id, sid, etc.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Naughty Me. While I was changing the database name from DB1 to DB_PROD1 (yep it's not real database name ^v^), I changed the database name and notified my application fellows that I did it. They turn on the application, and everything is working. A …
SQL Server engine let you use a Windows account or a SQL Server account to connect to a SQL Server instance. This can be configured immediatly during the SQL Server installation or after in the Server Authentication section in the Server properties …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question