Summary


This chapter looked at how SQL Server implements security through a combination of logins, users, roles, and permissions. You learned the difference between statement and object permissions and how to apply them using Enterprise Manager and T-SQL. The procedures are fairly straightforward, but careful thought must be taken when implementing a security model to avoid unauthorized access to data. If I can stress one thing about security, it is to always give only the most restrictive access possible. Giving users too high a permission level is often an accident waiting to happen. Remember: As administrator, it is you who will be left behind to clean up the accident scene. If you do run into problems, perhaps the next chapter, "Database Backup and Restore," will come in handy. A thorough understanding of SQL Server's backup and restore procedures are essential to managing your databases.



Microsoft SQL Server 2000 Unleashed
Microsoft SQL Server 2000 Unleashed (2nd Edition)
ISBN: 0672324679
EAN: 2147483647
Year: 2002
Pages: 503

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net