4 thoughts on “The SQL Server security model, part 4: execution context

  1. Pingback: The SQL Server security model, part 3: permissions « Sunday morning T-SQL

  2. Pingback: Availability Groups: How to sync logins between replicas | Sunday morning T-SQL

  3. Pingback: Effective permissions on SQL Server | sqlsunday.com

  4. Pingback: An alternative to data masking | sqlsunday.com

Let me hear your thoughts!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.