Solved

sybase, how do we check what privileges granted or cover by role ?

Posted on 2013-06-19
2
1,549 Views
Last Modified: 2013-07-15
I have a following user which have been granted with user define role, but I have  difficulties to understands what is inside the role. Can someone tell me how do we check what is inside user_sa_role


1> sp_displayroles 'trwkry'
2>
 Role Name
 ------------------------------
 user_sa_role

1>
1> sp_displayroles 'user_sa_role','expand_up'
2>
 Role Name                      Parent Role Name               Level
 ------------------------------ ------------------------------ ------

(0 rows affected)
(return status = 0)
1>
1>
1>
1> sp_displayroles user_sa_role,'expand_down'
2>
 Role Name                      Parent Role Name               Level
 ------------------------------ ------------------------------ ------
 sa_role                        user_sa_role                        1
 sso_role                       user_sa_role                        1

(2 rows affected)
(return status = 0)
1>
1>
1>
1> sp_displayroles user_sa_role
2>
 Role Name
 ------------------------------
 sa_role
 sso_role

(2 rows affected)
(return status = 0)
1> sp_displayroles
2>
 Role Name
 ------------------------------
 sa_role
 sso_role
 oper_role
 mon_role

(4 rows affected)
(return status = 0)
1>
0
Comment
Question by:motioneye
2 Comments
 
LVL 13

Accepted Solution

by:
alpmoon earned 250 total points
ID: 39261317
I think you have received the information you needed. user_sa_role has been created to combine sa_role and sso_role. When you grant user_sa_role to a user, that user will have both sa_role and sso_role.
0
 
LVL 24

Assisted Solution

by:Joe Woodhouse
Joe Woodhouse earned 250 total points
ID: 39261670
The other part of the question is to run "sp_helprotect" to see what permissions the role is granting on objects. It won't show permissions to run commands though, which it is inheriting from the system roles.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
Some code to ensure data integrity when using macros within Excel. Also included code that helps secure your data within an Excel workbook.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now