Abstract
Login authentication is the first gate through which users must pass, but this only verifies the user’s identity. Because SQL Server can manage multiple databases at one time, authentication must extend beyond server access to include database access authentication too. In that respect, database access offers a second security checkpoint through which a user must pass and provides an identifier for the user, to which you can assign permissions for actions on objects inside the database. This chapter focuses on SQL Server 6.5 alone, because SQL Server 7.0 introduced a significantly different way of managing both database access and database permissions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Morris Lewis
About this chapter
Cite this chapter
Lewis, M. (2004). Database Security in SQL Server 6.5. In: SQL Server Security Distilled. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0663-7_3
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0663-7_3
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-219-9
Online ISBN: 978-1-4302-0663-7
eBook Packages: Springer Book Archive