Conclusion

In this chapter, I covered the basics of security. First, you saw how SQL Server handles security. All users must jump through several hoops to gain access to the server. A user must gain access to the server by using a login ID. Then she must gain access to the database with a user ID and, finally, her user ID must be assigned permissions in the database. After you saw how SQL Server handles data and object security, you saw how you can use stored procedures to provide data security. This is done by creating stored procedures that your users can execute to gain access to the underlying tables, but by revoking their access to the tables themselves. Next, you saw how you can use application roles to provide application security for ...

Get Writing Stored Procedures for Microsoft SQL Server now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.