6 thoughts on “The SQL Server security model, part 4: execution context

  1. Pingback: The SQL Server security model, part 3: permissions « Sunday morning T-SQL

  2. Pingback: Availability Groups: How to sync logins between replicas | Sunday morning T-SQL

  3. Pingback: Effective permissions on SQL Server | sqlsunday.com

  4. Pingback: An alternative to data masking | sqlsunday.com

  5. Pingback: Preventing SQL injection in dynamic SQL

  6. Pingback: Revoking execute access on builtin functions on SQL Server

Let me hear your thoughts!

This site uses Akismet to reduce spam. Learn how your comment data is processed.