Solved

Partially Contained Databases - Connection Strings must be explicit

Posted on 2016-11-19
3
51 Views
Last Modified: 2016-11-22
Hi experts

i am Reading about: Partially Contained Databases - Connection Strings must be explicit
but i do not understand, can you give me an example.
0
Comment
Question by:enrique_aeo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 50

Accepted Solution

by:
Vitor Montalvão earned 500 total points
ID: 41895500
That means you always need to provide the database name, user name and password when you're trying to connect to this kind of database.
For a regular database you don't need to provide the database if the user has a default database configured but for a contained database you'll always need to provide it.
0
 

Author Comment

by:enrique_aeo
ID: 41896561
is it advantage? (Connection Strings must be explicit)
0
 
LVL 50

Expert Comment

by:Vitor Montalvão
ID: 41897091
Isn't a matter of being advantage or not. Is the only way it works. You do not have another option for Contained Databases.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question