VIII.3.2. What Can You Secure?

If you can store it or represent it in SQL Server, chances are that you can secure it. Microsoft has done a great job in creating fully integrated security architecture. All security-capable objects are securables. One securable might in turn enclose additional securables, thereby producing an encapsulated group of objects. These are scopes, and by setting security at the scope level, all securables contained within the scope receive the same security settings. Many securables can make up each scope; however, for the purposes of this chapter we focus on a few of the object securables within the schema scope.

To give you an idea of how many security options you have, the following list is categorized by SQL Server's three securable scopes:

  1. Server.

    This scope in turn contains three securables:

    Endpoint

    Login

    Database

  2. Database.

    UserRemote service binding
    RoleFull-text catalog
    Application roleCertificate
    AssemblyAsymmetric key
    Message typeSymmetric key
    RouteContract
    ServiceSchema
  3. Schema.

    Type

    XML Schema Collection

    Object

The Object securable is of most interest for this chapter, and will likely be the focus of most readers of this book. It contains the following components:

AggregateStatistic
ConstraintSynonym
FunctionTable
ProcedureView
Queue 

If some of the items in the preceding lists look a little unfamiliar to you, don't worry. The balance of the chapter focuses on securing the more recognizable objects, such as tables and views.

Get Microsoft® SQL Server™ 2008 All-In-One Desk Reference For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.