O'Reilly logo

MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance (70-444): Study Guide by Andy Warren, J. Steven Jones, Marilyn Miller-White, Victor Isakov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Maintaining a User-Level Security Strategy

The majority of access to SQL Server takes place by users who need to perform queries that retrieve or update data. As a result, the user security policy that you adopt will likely change and evolve over time to meet the changing needs of your users.

SQL Server 2005 has expanded upon the security policies in previous versions in a number of ways. For one thing, schemas have been added, more granular permissions are available on objects, and new policies are available for accounts. The following sections will identify many of these changes and provide guidelines on how to best include them in your policy.

Verifying the Existence and Enforcement of Account Policies

SQL Server 2005 offers two authentication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required