Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

SQL security

Posted on 2012-03-20
3
Medium Priority
?
183 Views
Last Modified: 2012-03-20
If we use the grant or deny to restrict access to certain database fields, do we have to use sql authentication for it to work. We currently use Windows Authentication.
0
Comment
Question by:qbjgqbjg
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:Barry Cunney
ID: 37743498
There should already be a Login principal for your Windows user in SQL Server under Security | Logins
You can create a database user principal in the required database associated with the Login principal
CREATE USER <yourDBUser> FOR LOGIN <YourWindowsUser>

You can then give whatever permissions you required to <yourDBUser>
0
 
LVL 17

Accepted Solution

by:
Barry Cunney earned 2000 total points
ID: 37743517
You could also create a Database Role which has the necessary field(column) permissions and associate this role with the user
0
 

Author Closing Comment

by:qbjgqbjg
ID: 37743791
Thanks. I think this will work.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains how to reset the password of the sa account on a Microsoft SQL Server.  The steps in this article work in SQL 2005, 2008, 2008 R2, 2012, 2014 and 2016.
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed
Using examples as well as descriptions, and references to Books Online, show the documentation available for datatypes, explain the available data types and show how data can be passed into and out of variables.

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question