O'Reilly logo

Programming Microsoft® SQL Server® 2012 by Leonard Lobel and Andrew Brust

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication and Authorization

Before we dive into the concepts of authentication and authorization, it is important to discuss a feature added in SQL Server 2005 called endpoints. In earlier versions of SQL Server, clients could connect via Transport Control Protocol (TCP), named pipes, shared memory, and Virtual Interface Architecture (VIA). As long as one of these protocols was enabled on the server and the user had a valid login, the connection was accepted. SQL Server 2005 introduced a separation of this behavior via endpoints.

Endpoints can be considered a point of entry into SQL Server. Administrators can create an endpoint not only for TCP, named pipes, shared memory, and VIA, but also for Hypertext Transfer Protocol (HTTP). Once an endpoint ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required