2010-04-09
3,209 reads
2010-04-09
3,209 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,461 reads
In this article, learn how to use the SQL Server agent proxy to run an SSIS Package under whatever account you choose.
2010-03-25
42,165 reads
2010-03-23
2,893 reads
There have been calls for governmental security regulations for IT. Is that a good thing? Steve Jones comments today.
2010-03-17
151 reads
2010-03-12
3,305 reads
If you think through the web sites you visit on a daily basis the chances are that you will need to login to verify who you are. In most cases your username would be stored in a relational database along with all the other registered users on that web site. Hopefully your password will be encrypted and not stored in plain text.
2010-03-10
3,893 reads
2010-03-03
11 reads
I have a requirement to implement a custom security scheme where roles and the user's place in the organization hierarchy are used to determine which customers a user can access. In particular the requirements are that a sales person can only access their customers and any other role can access any customer in their level of the organization hierarchy and below. We have a simple hierarchy that is made up of regions and offices. Can you provide us with an example of how to do this?
2010-03-01
3,410 reads
SQL Server impersonation, or context switching, is a means to allow the executing user to assume the permissions of a given user or login until the context is set back, set to yet another user, or the session is ended. Deanna Dicken shows you two mechanisms for accomplishing this task and walks through some examples.
2010-02-25
2,388 reads
By Rob Sewell
The Social Web Foundation is aiming to grow the fediverse and make the social...
By Steve Jones
A customer recently wanted to know if any of their instances were too old...
A reader of one of my previous posts pointed out that the legend order...
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers