Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to to use sql server application role in my connection string

Posted on 2014-02-05
7
Medium Priority
?
1,765 Views
Last Modified: 2014-03-04
My current application uses very powerful credential to access the sqlserver backend database. I want to improve this security hole in my application by using application role created.
I created one call:app-role, and it password =password.
In my webconfig file i just the app-role with it password. but when i trying to log in it fail.
Can some tell me what am doing wrong .I will appreciate a sample
0
Comment
Question by:Atouray
  • 3
  • 2
  • 2
7 Comments
 
LVL 16

Expert Comment

by:Surendra Nath
ID: 39835579
for authenticating in SQL Server, you can choose either a windows authentication or a SQL authentication or both of them...

in your case I suggest you to use the SQL Authentication and put them in the webconfig file.....

and add all the roles that you want to the SQL authenticated User....
0
 

Author Comment

by:Atouray
ID: 39835689
I know about the two types of authentication on sqlserver.
The sqslserver database user account my application uses to login can be easily access for example our internal developers. once they are able to get the credentials from the web configuration, they can use it to login with management studio.But with Application role, the web application can use it and even is access by some one else , it cannot be use to login with management studio. This is my objective of using application role in my connection string
0
 
LVL 16

Expert Comment

by:Surendra Nath
ID: 39835744
instead of it you can use the firewall on the SQL Server machine, to allow only your webserver or application servers incoming connections and block any other IP's.

This way any one who will have the physical or remote access to your application server can only login into the SQL Server.
0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 

Author Comment

by:Atouray
ID: 39835959
Application Roles;
This application role enable you to grant permissions to specific application.
For Example you might have a web application that needs to interact with a database hosted on a back-end sqlserver instance.
Rather that having a user access the database with a database user permission, the user accesses the data by the permission assigned to the
application role.
This is why am using this approach.After this, i can configure my application to be access via certain port through fire wall.
0
 
LVL 75

Accepted Solution

by:
Anthony Perkins earned 1000 total points
ID: 39842584
I suggest you read up on Application Roles and in particular the use if sp_setapprole
0
 

Author Closing Comment

by:Atouray
ID: 39903443
My question was not fully answer but your link is useful
0
 
LVL 75

Expert Comment

by:Anthony Perkins
ID: 39905198
My question was not fully answer but your link is useful
Perhaps next time you will take the time to re-read the EE Guideline regarding grading.  Clearly you need a re-refresher.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question