Choose your database:
AnySQL
MySQL
MS SQL Server
PostgreSQL
SQLite
Firebird
Oracle
SQL Anywhere
DB2
MaxDB

Subscribe to our news:
Partners
Testimonials
Albert Rognan: "Thank you for this quick reply. I must say I am impressed of the number of functions that is available within this tool".
Alex Torin: "Several months ago I downloaded the trial versions of several Microsoft SQL administration tools that I was able to find using google. I had considerable trouble with most of them crashing... but using your product I was able to isolate and solve the problems I was having. I decided to add it to my toolkit and have recommended it to a few others".

More

Add your opinion

MS SQL Maestro online Help

Prev Return to chapter overview Next

Users

A user passes through two stages of security when working in Microsoft® SQL Server™: authentication and authorization (permissions validation). The authentication stage identifies the user using a login account and verifies only the ability to connect to an instance of SQL Server. If authentication is successful, the user connects to an instance of SQL Server. The user then needs permissions to access databases on the server performed by granting access to an account in each database, mapped to the user login.

 

Every database cluster contains a set of database users. Those users are separate from the users managed by the operating system under which the server runs. Users own database objects (for example, tables) and can assign privileges on those objects to other users to control who has access to which object.

 

Note: Use of roles simplifies security administration in databases with a large number of users or with a complex security system.

 



Prev Return to chapter overview Next