Abstract
How you secure a server for replication depends to a large extent on your environment; securing a server that is accessible to clients on the Internet is very different from securing a server that will only have clients on the internal network. As you saw in Chapter 5 and 6, special consideration is required if users can log into the server directly, and replication servers are no different. The role a server plays in the replication architecture also affects how you will secure the server. Before I cover the security, let’s look at the architecture and options available in SQL Server replication.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Morris Lewis
About this chapter
Cite this chapter
Lewis, M. (2004). Replication Security. In: SQL Server Security Distilled. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0663-7_8
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0663-7_8
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-219-9
Online ISBN: 978-1-4302-0663-7
eBook Packages: Springer Book Archive