Solved

execution context - token

Posted on 2010-08-12
3
542 Views
Last Modified: 2012-05-10
Hi experts, i am reading about execution context, but i don't understand a login token ( sys.login_token)  and a user token(sys.user_token).
I need an example (like a hands on lab) in which they explain the diference between these two token
0
Comment
Question by:enrique_aeo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Assisted Solution

by:Sreedhar Vengala
Sreedhar Vengala earned 100 total points
ID: 33425747
Look into this http://www.sommarskog.se/grantperm.html got details explanation of sys.login_token and sys.user_token
0
 

Author Comment

by:enrique_aeo
ID: 33431519
Please experts, I need something more precise, an example would be excellent transact sql
0
 
LVL 60

Accepted Solution

by:
Kevin Cross earned 400 total points
ID: 33433293
Run this on your system :

-- http://technet.microsoft.com/en-us/library/ms186740.aspx
select *
from sys.login_token;

And read the Technet link and should help as you will see this is as the site says a listing of credentials including their type (Windows, SQL Server, etc.), their principal id, sid, etc.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Occasionally there is a need to clean table columns, especially if you have inherited legacy data. There are obviously many ways to accomplish that, including elaborate UPDATE queries with anywhere from one to numerous REPLACE functions (even within…
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question