How to determine what Hash Algorithm type is used when SQL logins are created via SSMS in SQL Server 2008?

Posted on 2016-07-25
Last Modified: 2016-07-26

The question is as the above title: How does a DBA determine what Hash Algorithm type is used when SQL logins are created via SSMS in SQL Server 2008?

Any assistance is appreciated.

Thank you.
Question by:Zack
LVL 29

Accepted Solution

Olaf Doschke earned 500 total points
ID: 41728910
If you create SQL Logins based on Windows accounts SQL Server does not store them at all, the Login process then is delegated to Active Directory and based on OS Login, which is done via NTLMv2 challenge-response authentication protocol.

For SQL Server users, the user data is found in master data and via LOGINPROPERTY():
SELECT name, LOGINPROPERTY(name,'PasswordHashAlgorithm')
FROM syslogins

Open in new window

0 means a SQL7.0, 1 and 2 are SHA-1 and SHA-2 respectively.

Author Closing Comment

ID: 41728914
Thank you for the information.

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
sql server query? 6 28
Database Containment - Benefits 6 26
using t-sql EXISTS 8 23
replication - alerts? 4 23
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now