MS SQL Maestro online Help
Prev | Return to chapter overview | Next |
Logins
A user passes through two stages of security when working in Microsoft® SQL Server™: authentication and authorization (permissions validation). The authentication stage identifies the user by a login account and verifies only the ability to connect to an instance of SQL Server. If authentication is successful, the user connects to an instance of SQL Server. The user then needs permissions to access databases on the server done by granting access to an account in each database mapped to the user login.
To give permissions for changing server objects to a login, you should include the login into the appropriate server role.
There are four types of logins: Windows Authentication, SQL Server Authentication, and also Certificate, and Asymmetric Key for Microsoft SQL Server 2005.
• | It is recommended to you use Windows Authentication for security reasons because the users who connect through a Microsoft Windows NT® 4.0 or Windows® 2000 user account can make use of trusted connections. Trusted connections are those validated by Windows NT 4.0 or Windows 2000. |
• | It is also possible to connect using SQL Server Authentication. When a user connects with a specified login name and password from a nontrusted connection, SQL Server performs the authentication itself by checking to see if a SQL Server login account has been set up and whether the specified password matches the one previously recorded. If SQL Server does not have a login account set, authentication fails and the user receives an error. |
• | To enable encrypted connections, create login from a Certificate or from an Asymmetric Key. |
New logins are created within Create Login Wizard. In order to run the wizard you should either
or
|
Logins are edited within Login Editor. In order to open the editor you should either
or
|
To drop the existing login:
or
and confirm dropping in the dialog window.
|