Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

users who have DML privileges in SQL 2000

Posted on 2010-08-20
4
Medium Priority
?
382 Views
Last Modified: 2012-05-10
How can you script out the users who have DML privileges in SQL 2000?

thanks
0
Comment
Question by:anushahanna
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 60

Accepted Solution

by:
Kevin Cross earned 2000 total points
ID: 33491825
anushahanna:Let's test my memory...give these a try:-- this table will map for you userid (uid) to sid to username|rolename-- using the is??? flags you can figure out if user, role, etc. select *from sys.sysusers;-- matches user to things like sysadmin, serveradmin, etc.-- uses sid, so will need to match to sysusers using sidselect *from sys.syslogins;-- has explicitly assigned rights-- has a grantor and grantee field that matches to sysusers uid-- e.g., grantee_principal_id = uidselect * from sys.database_permissions;With the combination, you can try to find out what you are looking for via T-SQL.Regards,Kevin
0
 
LVL 6

Author Comment

by:anushahanna
ID: 33500717
Thanks Kevin;

I am able to get the first 2 in SQL 2000 with
select * from dbo.sysusers
select * from master.dbo.syslogins

what would be the equivalent of sys.database_permissions?
0
 
LVL 60

Assisted Solution

by:Kevin Cross
Kevin Cross earned 2000 total points
ID: 33502808
http://msdn.microsoft.com/en-us/library/aa260604(SQL.80).aspx
try syspermissions or see if the data is in syslogins ... has been too long since I actually looked at a SQL 2000 server instance. Have database in SQL 2000 compatibility mode where the above works as typed, but that is due to the underlying engine being SQL 2008 most likely.
0
 
LVL 6

Author Comment

by:anushahanna
ID: 33503375
Thanks for the direction, Kevin.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Windocks is an independent port of Docker's open source to Windows.   This article introduces the use of SQL Server in containers, with integrated support of SQL Server database cloning.
One of the most important things in an application is the query performance. This article intends to give you good tips to improve the performance of your queries.
Via a live example, show how to extract insert data into a SQL Server database table using the Import/Export option and Bulk Insert.
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question