5 thoughts on “The SQL Server security model, part 1: principals

  1. Pingback: The SQL Server security model, part 3: permissions « Sunday morning T-SQL

  2. Pingback: The SQL Server security model, part 4: execution context « Sunday morning T-SQL

  3. Pingback: Availability Groups: How to sync logins between replicas | Sunday morning T-SQL

  4. Pingback: Effective permissions on SQL Server | sqlsunday.com

  5. Pingback: Find all instances where a user has been explicitly granted permissions on an object

Let me hear your thoughts!

This site uses Akismet to reduce spam. Learn how your comment data is processed.