- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
I'm continuing our discussion of SQL Server Security in this series , where I've already described security in general, and on the platform in specific, as well as a graphical step-by-step tutorial on how to create users in the last tutorial. If you're just coming into this series from this tutorial, make sure you check those out as well. They introduce concepts that I'll continue here.
In the earlier tutorials I compared a SQL Server setup to a bank building. In a bank building, security is designed from the outset, and only by following the design is the bank truly secure. I've explained that by choosing the proper options for your server you can secure it similar to the bank building, and by working with users (or as Microsoft calls them, principals), you can treat accounts similar to bank customers.
Working with only a few users is not very difficult. If you have only a few users, normally they have different needs for access into the system. But when you are working with large groups of users, having to set individual rights and privileges becomes more difficult. Many users have similar security needs, and those needs are likely based on the role they fill at an organization, such as "Accountants" or "Managers." In this tutorial I'll explain how to group of users into what Microsoft calls roles in SQL Server 2000 and 2005.
There are two ways to work with groups of users in SQL Server. I'll mention the first method, which isn't controlled directly by SQL Server and then focus primarily on the second method, which is controlled entirely by SQL Server.
The first method of working with groups in SQL Server is to allow the Windows system to handle the groups. This is a common way of handling security if you normally manage everything from the operating system, or if you have a situation where your Windows security is similar to the kinds of SQL Server authentications you want. This authentication works with local Windows groups, domain groups, and Active Directory groups.
In this example, I have several applications hosted on my server, all of which can work with Windows security. I want to handle the security for all of these applications, SQL Server included, by putting users into and out of groups in my local Windows system.
I already have three users on my Windows 2003 server called SQL:
- Jane Manager (SQL\JaneManager)
- Peter Accountant (SQL\PeterAccountant)
- Steve Administrator (SQL\SteveAdministrator)
I want to put these users into two groups: Managers and Staff. I'll use these groups in my SQL Server database as well as other applications I have on my server. Here are the basic steps, whether you're using SQL Server 2000 or 2005:
- Create Windows groups
- Assign users to the groups
- Create Windows Logons in SQL Server, tied to the group
- Assign the SQL Server Logons to a Database
Let's look at how I handled this for my system. The first two steps work the same way whether you're using Windows 2000 or 2005.
Since I already have my users, I just need to create the Windows groups from step 1. You can do this graphically, either locally or in domains or Active Directory environments. Since I'm using local security, I'll just use the following Windows command-line commands to create the groups:
NET LOCALGROUP Managers /ADD NET LOCALGROUP Staff /ADD
These are local groups, which means that they are only valid on this server. With the groups created, I'll move on to step 2 and add the users to the groups. I'll put Jane in the Managers group and the other two users in the Staff group, once again from the Windows command line:
NET LOCALGROUP Managers JaneManager /ADD NET LOCALGROUP Staff SteveAdministrator PeteAccountant /ADD
The users and groups are all ready to go.
Setting up Windows Groups for SQL Server 2000 Authentication
For step 3 I'll open Enterprise Manager and drill down to the server I'm working with. I'll right-click the Security object on the left and then click the New Login menu item that appears:
When the detail dialog box shows, I fill out the information just like I would with a single user, but I enter the name of the Windows group:
Just as I showed you in the last tutorial, you can add the user (in this case the Windows group) to a database from here, but I'll forgo that so that you can see the process from the database side. Instead I close that panel by clicking the OK button, and then I expand the pubs database object on the left. I then right-click the Users object and select New Database User... from the menu that appears:
Once the detail dialog opens I pull down the name of the group, and add it as a user. That's all there is to it. I'll repeat the previous two
I'll repeat the previous two steps for the Staff group as well.
Setting up Windows Groups for SQL Server 2005 Authentication
For step 3 I'll open Management Studio, connect to my server, and in the Object Browser I'll expand the Security item. From there I'll right-click the Logins item and select New Login from the menu that appears:
When the Properties Panel opens I enter the Managers group name as a user:
This time, rather than creating the user (in this case a Windows group) to a database as I did in the last tutorial, I'll assign the database to this Windows group here on this dialog. I'll click the User Mapping item on the left, and click the AdventureWorks database, which adds the group as a user in the database.
Server and Database roles
While the previous method works with some environments, in most shops you'll create and control groups of users using SQL Server roles. There are two types of roles, one at the server level, and another at the database level.
This week, I'll show you how to use roles — SQL Server's version of groups. I'll explain how to make them, where to use them and what the rules are.
You can use SQL Server roles like an operating system’s groups. They are just containers that hold user accounts, and are in turn treated like a user account. You can grant permissions and rights to the roles, and then assign Windows or SQL Server accounts to one or more roles. Using this method you can standardize on your security.
Types of roles
In both SQL Server 2000 and 2005 there are two types of roles — server and database. Server roles are predefined, and allow users to do things like add other users. You can't create more Server roles; you can only add and remove accounts from them. We'll explore this type of role in more detail later in this tutorial.
The other type of role in SQL Server is the Database role. Microsoft delivers several Database roles that cover the rights and privileges that most users need. The difference between Database and Server roles are that you can create more Database roles, and they only allow access to the objects within a specific database.
When you're applying the permissions I’ve explained in the last two tutorials, you can (and normally should) apply them to roles instead. By applying complex permissions to a role instead of an individual account you simplify the amount of work you need to do to maintain your security. When a user leaves the company, there's no need to chase down all their permissions, just remove them from the role.
Naming roles
When you create Database roles, it’s important to consider the names you’ll use. Many administrators create roles using the name of a department or function, such as Marketing or Finance. While using this naming convention does logically group the users, it doesn't explain the security very well within the database. Users don’t often see the names, so it isn't important to use business names. Instead, it makes more sense to name roles based on what they can do, such as Access_Finance_Tables and so forth. If you don't immediately see the logic in this process, then open any SQL Server Enterprise Manager or SQL Server Management Console, navigate to a database, and look at the group names. Can you tell what the groups do?
Predefined roles
Let’s take a look at the server and Database roles that are delivered with SQL Server and what they have rights to do.
SQL Server 2000 Server roles
Role |
Rights |
Bulkadmin |
Can execute BULK INSERT statements |
Dbcreator |
Create, alter, and drop databases |
Diskadmin |
Manage disk files |
Processadmin |
Manage processes running in SQL Server |
Securityadmin |
Manage logins and CREATE DATABASE permissions, also read error logs and change passwords. |
Serveradmin |
Set server-wide configuration options, also shut down the server |
Setupadmin |
Manage linked servers and startup procedures |
Sysadmin |
Can perform any activity in SQL Server |
It's okay to add a login to more than one Server role. Many admins do this so that others can manage the various parts of the server.
With SQL Server 2005, you have the same Server roles:
SQL Server 2005 Server roles
Role |
Rights |
Bulkadmin |
Can execute BULK INSERT statements |
Dbcreator |
Create, alter, and drop databases |
Diskadmin |
Manage disk files |
Processadmin |
Manage processes running in SQL Server |
Securityadmin |
Manage logins and CREATE DATABASE permissions, also read error logs and change passwords. |
Serveradmin |
Set server-wide configuration options, also shut down the server; alter endpoints |
Setupadmin |
Manage linked servers and startup procedures |
Sysadmin |
Can perform any activity in SQL Server |
SQL Server 2000 Database roles
Database roles are the type of groups you'll work with most often in SQL Server. Just like the Server roles, there are some pre-defined roles already set up for you:
Role |
Rights |
db_accessadmin |
Add or remove user Ids |
db_backupoperator |
Issue DBCC, CHECKPOINT, and BACKUP statements. |
db_datareader |
Select all data from any user table in the database |
db_datawriter |
Modify any data in any user table in the database |
db_ddladmin |
Issue all Data Definition Language (DDL) statements |
db_denydatareader |
Cannot select any data from any user table in the database |
db_denydatawriter |
Cannot modify any data in any user table in the database |
db_owner |
Has full permissions to the database |
db_securityadmin |
Manage all permissions, object ownerships, roles and role memberships |
Once again, the SQL Server 2005 roles are the same.
SQL Server 2005 Database roles
Role |
Rights |
db_accessadmin |
Add or remove user Ids |
db_backupoperator |
Issue DBCC, CHECKPOINT, and BACKUP statements. |
db_datareader |
Select all data from any user table in the database |
db_datawriter |
Modify any data in any user table in the database |
db_ddladmin |
Issue all Data Definition Language (DDL) statements |
db_denydatareader |
Cannot select any data from any user table in the database |
db_denydatawriter |
Cannot modify any data in any user table in the database |
db_owner |
Has full permissions to the database |
db_securityadmin |
Manage all permissions, object ownerships, roles and role memberships |
Creating and Using roles
To create roles, you can use graphical tools or commands. For SQL Server 2000, open Enterprise Manager and drill down to the Databases object. Double-click the name of the database you’re interested in adding a role to. Right-click the roles object to create a role. Once you’ve added the role, you can control its rights and add or subtract users by double-clicking it.
In SQL Server 2005, open the SQL Server Management Studio, and then drill down to the Databases item in the Object Browser. Open the database you want to work with, and navigate to Security, then roles and then Database roles. Right-click to add a role. Once you’ve added the role, you can control its rights and add or subtract users by double-clicking it, if you want to work with it graphically.
If you want to create and work with a new role in T-SQL use Query Analyzer (SQL Server 2000) or a new query window in SQL Server Management Studio (SQL Server 2005). This is the preferred method for adding large groups of roles and assigning users to them. It's easier to create these kinds of scripts with multiple lines than clicking around graphically.
To create a new database role, type:
sp_addrole 'rolename'
Replace rolename with the name you want. The role can't do much at this point, but it's there. To add a user to the role, use the command:
sp_addrolemember 'rolename', 'username'
Notice that it's the database user name, not the server login name. That's only important if you used a different name for the two, which I don't recommend.
To remove a user from a role, type:
sp_droprolemember 'rolename', 'username'
To completely remove the role, use the command:
sp_droprole 'rolename'.
You can add a logon to more than one Database role. The user gets the greatest allowed permissions, with the exception of any of the "deny" roles. Those supersede any other memberships.
As I mentioned earlier, you should create your roles and then apply the proper level of permissions to them, adding user accounts to the roles. Use this approach even for one account, and grant the rights to that role. When the security plan gets complex, your naming convention will help you wade through it.
Application roles
One of the most useful types of roles for a distributed application is the Application role. An Application role has no users assigned to it, but it does have a password. You grant the rights to the role just as any other.
The difference is that you activate the role using code, such as a SQL Statement, Visual Basic or C# code, passing along the role name and password. The commands are executed, and as soon as the connection is released, the role goes inactive again.
This provides a high level of security. If you create an application using this type of role exclusively, you don't have to create any user accounts. You can also use the role to have an application run a higher-privileged command on behalf of the user.
The T-SQL syntax to create an Application role is:
sp_addapprole 'app_rolename', 'password'
The second parameter is the password you want for the role. Users are not normally given this password. What most developers do is create a table of user information in the database, including passwords the user sets. The developer uses the application role password to check the table to see what the user is allowed to do.
To activate the role, the developer sends the command:
sp_setapprole 'app_rolename', 'password'
As soon as the connection is broken, the role reverts back to an inactive state. You can encrypt the password for the role on the wire with the command:
sp_setapprole 'approlename', {Encrypt N 'password'}, 'odbc'
In the next tutorial, I'll talk about working with these users and roles with the objects they need to access.
Informit Articles and Sample Chapters
Richard Waymire covers more about security in this free chapter from his book Sams Teach Yourself Microsoft SQL Server in 21 Days.
Online Resources
Microsoft’s site for SQL Server Security is here. You can learn all about security on this site as well as download some handy checklists.