- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
I'm continuing my series on the concepts behind SQL Security. In the previous entries I've explain SQL Server logins and database logons, and I've given you the basics on object and statement permissions. You should read through those before you read this article — I’ll bring everything together here, from creating users and roles to assigning permissions to objects like tables, views and stored procedures.
Security is all about allowing only the access to objects needed by a "principal," which is what Microsoft calls any entity that uses SQL Server, from people to service and certificates. The process for assigning permissions can be very complex, but if you break it down it can be simplified. I usually follow this process:
- Identify the objects in the database
- Identify the users who need access
- Create database roles (more on this in a bit)
- Set the permissions for the roles on the objects
- Add the users to the roles
I normally lay out these elements in a spreadsheet to create the security matrix. I can then implement the design using graphical tools as I've shown you in the other tutorials or by using commands. In fact, if you set up the spreadsheet with the commands, you can create your security scripts from there. I'll show you how I do this in another tutorial.
Identify the Objects You want to Secure (Securables)
To identify the objects, you can just look at them in the graphical tools in Enterprise Manager (EM) or SQL Server Management Studio (SSMS), or, if your graphical diagrams are accurate, you can use those. I normally use the INFORMATION_SCHEMA system construct to list out the objects I want to apply permissions to — in most cases, Tables, views and Stored Procedures, like this:
/* Identify the Objects - Tables, Views, Stored Procedures: */ SELECT TABLE_NAME FROM INFORMATION_SCHEMA.TABLES ORDER BY TABLE_NAME ASC; GO SELECT TABLE_NAME AS 'VIEW_NAME' FROM INFORMATION_SCHEMA.VIEWS ORDER BY TABLE_NAME ASC; GO SELECT ROUTINE_NAME, ROUTINE_TYPE FROM INFORMATION_SCHEMA.ROUTINES ORDER BY ROUTINE_NAME ASC; GO
Note that the INFORMATION_SCHEMA view is ISO compliant; it does not list every object SQL Server can work with. I present it here because it is the most compatible way of working across systems. I normally only apply permissions at these levels anyway — it catches all of the objects I normally work with.
Identifying or Creating the Principals
As I explained in earlier tutorials, you need to create a server login account before you can assign a database object permission. Then you can tie the login to a to a database user, and then grant or deny that account permissions to various objects in a database. I recommend that you add the additional steps of creating a database “Role”, and apply permissions to that, and then add the user to the Role — but I’ll cover that more in a moment.
I’ve also explained that there are two types of login authentication for SQL Server: Windows users and SQL Server users. The commands I’m about to show you depend on the type of authentication your server has installed. I'm going to show you how to use the stored procedures that SQL Server provides for security, and I’ll also show you the more ANSI-compliant method of using the CREATE, DROP, and other Transact-SQL commands to work with security. While there are some stored procedures that simplify things greatly, you should learn the newer syntax. I’ll show both here — and you can choose which to work with.
The first stored procedure for creating SQL Server logins using SQL authentication is called sp_addlogin. The format looks like this:
sp_addlogin ’username’, ’password'
If you have Windows authentication set on your server, you use a different stored procedure called sp_grantlogin, and it doesn't require the password:
sp_grantlogin ’domain\username’
Notice that you have to specify the domain name. SQL Server will "trust" that account, so it doesn’t track the password. If you're not on a domain but in a workgroup instead, the domain name is the server name itself. Keep in mind that the user would need to authenticate with that name and password on the SQL Server system, so unless this is a locally installed version of SQL Server you'll want to either use a domain or create a SQL Server login for that situation.
Here are some other commands you can use to work with logins, with links to the syntax for each:
Stored Procedure |
Purpose |
sp_defaultdb |
Sets a login’s default database |
sp_denylogin |
Denies a login |
sp_droplogin |
Removes a login |
sp_helplogins |
Displays logins |
sp_password |
Changes a login’s password |
sp_revokelogin |
Revokes a login |
sp_validatelogins |
Shows "orphans" in the database. These are logins that exist in SQL Server, but no longer exist as a Windows account. |
Rather than working with the stored procedures, you might want to learn to work with the CREATE syntax, which is more standard. The basic format looks like this for a Windows user:
/* Create Instance Accounts, Then Database Users */ -- Windows Account CREATE LOGIN [MyDomain\Buck] FROM WINDOWS; GO And like this for a SQL Server based account: -- SQL Server Account CREATE LOGIN User1 WITH PASSWORD = 'Letmein12345'; GO
Once you have the Server logins created, it’s time to tie the login to access a database. Once again, you can use a stored procedure to do this — sp_grantdbaccess. Here's an example of the syntax:
sp_grantdbaccess ’domain\WindowsUserName, ’SQLLoginName’
Make sure you’re "in" the database to which you’re granting the account access. You can do that by pulling down the database name menu in Query Analyzer/SQL Server Management Studio or (safer) by type the USE databasename command. What you’re doing with this stored procedure is setting the domain account to a user account in this database. Yes, you could name it something different, but you can also drive your car into a lake. There aren’t a lot of good reasons to do either one.
Just as with the logins, there are other commands to help you work with the logons, ones that you should learn to use. To create a new user in a database that is tied to a SQL Server account, use the CREATE USER command, like this:
-- Database Login CREATE USER User1 FOR LOGIN User1; GO
And there are some other stored procedures you can use to work with users once you create them. Here’s a couple that you might find useful:
Stored Procedure |
Purpose |
sp_helpuser |
Displays information about a database user |
sp_revokedbaccess |
Removes a login from the database |
Create Database Roles, Assign Users to the Roles
I’m not going to spend a great deal of time on roles in this tutorial; I’ll cover the entire concept of roles in a following tutorial. But for now you can think of a Role in a database like a Group in Windows or Unix. they merely contain database users, or even other Roles. Simply creating a Role doesn’t do anything special — but once you do, you can assign permissions to the Role for things like a table or stored procedure. Here’s how to create a Role in a database (remember to use the USE statement to move to the database first):
/* Create A database Role */ CREATE ROLE SelectFromView; GO CREATE ROLE ExecuteAProc; GO Now it’s a matter of placing the user in a Role. For that, it’s OK to use a stored procedure, and it’s very simple to do that: /* Add user to Role */ EXEC sp_addrolemember 'SelectFromView' , 'User1'; GO EXEC sp_addrolemember 'ExecuteAProc' , 'User1'; GO
Now that you have your server logins, the database users created, and you’ve assigned the user to a Role, you need to set the permissions for the various database objects.
Set Permissions on the Object to the Role
You can grant or deny permissions to users or roles. The main commands to use are GRANT, DENY and REVOKE. Remember that permissions are layered on each object, so permissions need to be set on views and the tables they references, unless they are owned by the same account, and if the objects are owned by a single user, you only have to set permissions on the "parent" object.
Not only does each object require the security, but each statement requires the security. In other words, if you need to allow access to a few columns in a table, you have to issue the GRANT command on the table and the SELECT, INSERT, UPDATE, and DELETE verbs. The verbs are self-explanatory. Using this "layered" security approach, you can set certain accounts (or roles) to be able to see (SELECT) certain portions of data from a table and not be able to change (UPDATE) or erase (DELETE) it.
The one verb I didn’t mention is the EXECUTE permission. As long as one account created the objects in the database, you only need to set the permission on the stored procedure.
The GRANT verb allows access to an object. The general syntax looks like this:
GRANT SELECT ON object TO principal (like a Role or a User) You can use more than one verb here — just add a comma between them, like this: GRANT SELECT, UPDATE ON object TO principal
You don’t have to type every verb if you want to give every permission to an account. Just use the ALL permission, which is basically everything.
What if you want the opposite? If you don’t want to the account to access an object, use the DENY verb. The general syntax looks like this:
DENY INSERT ON object TO principal
Remember the REVOKE command? I know we haven’t talked about roles yet, but let’s say "Buck" is a member of a role called "Normal" (no real danger of that). Let’s say that we don’t want Buck to be able to access a table, even though his group (Normal) still needs to. For that, use the DENY verb. But let’s say now you want Buck not to have access to the table, but if he’s the member of a group that does need access, we don’t want to affect that. For that situation, use the REVOKE command. It looks like this:
REVOKE SELECT ON authors FROM [HQ\Buck]
I’ll show you how to put these commands to good use in the next few tutorials on security.
Books and eBooks
I cover more about security in my book Administrator's Guide to SQL Server 2005. Even though it’s a previous version, the information still holds for the security aspects.