Solved

sybase, how do we check what privileges granted or cover by role ?

Posted on 2013-06-19
2
1,681 Views
Last Modified: 2013-07-15
I have a following user which have been granted with user define role, but I have  difficulties to understands what is inside the role. Can someone tell me how do we check what is inside user_sa_role


1> sp_displayroles 'trwkry'
2>
 Role Name
 ------------------------------
 user_sa_role

1>
1> sp_displayroles 'user_sa_role','expand_up'
2>
 Role Name                      Parent Role Name               Level
 ------------------------------ ------------------------------ ------

(0 rows affected)
(return status = 0)
1>
1>
1>
1> sp_displayroles user_sa_role,'expand_down'
2>
 Role Name                      Parent Role Name               Level
 ------------------------------ ------------------------------ ------
 sa_role                        user_sa_role                        1
 sso_role                       user_sa_role                        1

(2 rows affected)
(return status = 0)
1>
1>
1>
1> sp_displayroles user_sa_role
2>
 Role Name
 ------------------------------
 sa_role
 sso_role

(2 rows affected)
(return status = 0)
1> sp_displayroles
2>
 Role Name
 ------------------------------
 sa_role
 sso_role
 oper_role
 mon_role

(4 rows affected)
(return status = 0)
1>
0
Comment
Question by:motioneye
2 Comments
 
LVL 13

Accepted Solution

by:
alpmoon earned 250 total points
ID: 39261317
I think you have received the information you needed. user_sa_role has been created to combine sa_role and sso_role. When you grant user_sa_role to a user, that user will have both sa_role and sso_role.
0
 
LVL 24

Assisted Solution

by:Joe Woodhouse
Joe Woodhouse earned 250 total points
ID: 39261670
The other part of the question is to run "sp_helprotect" to see what permissions the role is granting on objects. It won't show permissions to run commands though, which it is inheriting from the system roles.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
To form a query 10 399
SQL Sybase - Convert Rows to Columns 10 446
SQL Syntax Select Top in each group 2 184
surrogate key in database world 6 86
Read about the ways of improving workplace communication.
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question