Login and User security in SQL Server 2008. For more videos on technology, visit http://www.Techytube.com
By Jayanth Kurup / Techytube.com
This video introduces the principle of least privileges and how to implement it within a database schema. Security is a prime concern for every organization therefore everybody has a stake in helping the company achieve compliance. Sometimes it is self-enforced other times it is mandatory. Regardless of why your implementing it the DBA is a key member in helping you achieve these goals and one of the first and most basic steps include mapping logins to users in the database. These users in turn map to roles or schema within the database and the schema in turn own objects like tables and procedure. These layers help control and restrict access in terms of which login or user has access to what objects. The video covers how to create a login that is bound to a windows account. This is followed by how to map the login to a user within a database and lastly how to grant the user specific permissions on a procedure in order to execute it.
This simple video help you get started in implementing what will be a robust security model within your database server and in most cases is sufficient in order to make sure your database is secure. We will cover many more advances security principles such as auditing and DDL triggers etc. in future videos.
Tags: Login and User security in SQL Server 2008, sql server, authenticaiton, security