6 thoughts on “The SQL Server security model, part 4: execution context

  1. Pingback: The SQL Server security model, part 3: permissions « Sunday morning T-SQL

  2. Pingback: Availability Groups: How to sync logins between replicas | Sunday morning T-SQL

  3. Pingback: Effective permissions on SQL Server | sqlsunday.com

  4. Pingback: An alternative to data masking | sqlsunday.com

  5. Pingback: Preventing SQL injection in dynamic SQL

  6. Pingback: Revoking execute access on builtin functions on SQL Server

Let me hear your thoughts!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.