5 thoughts on “The SQL Server security model, part 1: principals

  1. Pingback: The SQL Server security model, part 3: permissions « Sunday morning T-SQL

  2. Pingback: The SQL Server security model, part 4: execution context « Sunday morning T-SQL

  3. Pingback: Availability Groups: How to sync logins between replicas | Sunday morning T-SQL

  4. Pingback: Effective permissions on SQL Server | sqlsunday.com

  5. Pingback: Find all instances where a user has been explicitly granted permissions on an object

Let me hear your thoughts!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.