Home Menu
  • Home
  • About – Tomas Lind
  • Contact
  • Blog Series
    • Technical Analysis (TA)
  • T-SQL
    • T-SQL Scripts
    • Templates
  • Consulting Services
  • Software
Tomas Lind

Posts in Category ‘Security’

  • 2017/12/30
  • 0 comments

Dynamic Data Masking (DDM) – Mask query results

Enforcement of the new GDPR will begin in May 2018. One of the cornerstones in GDPR is that an organization must be able to protect sensitive personal information. This can be achieved in many ways and at many different levels, … Read more →

  • Posted in: Security
  • 2014/03/11
  • 0 comments

Map users to logins

“Why can’t I login after the database restore?” As a DBA, this is one of the questions I get most.

  • Posted in: Permissions, Security, System Stored Procedures
  • 2014/02/27
  • 0 comments

Deny updates on a table but allow inserts

Sometimes it is nessesary to deny updates on a table, but allow inserts. This is the case when the history must never be changed, for instance in a table with accounting data. This can be done in two different ways. … Read more →

  • Posted in: Permissions, Security, Triggers
  • 2014/02/20
  • 4 comments

List SQL server roles by users

SQL Server roles can be used to give users server wide privileges. The server roles are sysadmin, securityadmin, serveradmin, setupadmin, processadmin, diskadmin, dbcreator and bulkadmin. The mapping between users and server roles can be found in the system view sys.server_role_members. … Read more →

  • Posted in: Dynamic Management Objects, Permissions, Security
  • 2014/02/18
  • 0 comments

A replacement for syslogins

The system table sys.syslogins was marked as deprecated in SQL Server 2005, and is included up until 2012 for backwards compability only. So what is the replacement of sys.syslogins? As it turns out, there is no exact match in SQL … Read more →

  • Posted in: Dynamic Management Objects, Permissions, Security
  • 2014/02/11
  • 27 comments

Copy logins between SQL Server instances

If you are using SQL Server log shipping (or mirroring), you probably want to copy the logins from the primary server to the secondary. When databases are log shipped, the users go along with their respective databases. But those users … Read more →

  • Posted in: Log Shipping, Mirroring, Security

confided data manager

Get compliant with the GDPR!


High Coast Database Solutions

High Coast Database Solutions

sql server consulting services


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Top Posts & Pages

  • How to align columns in Notepad++
  • Manual failover in a SQL Server cluster
  • List SQL server roles by users
  • Export data from Excel to SQL Server
  • Sending HTML tables in mail from SQL Server

Recent Posts

  • Get element max value from folder with XML files
  • Dynamic Data Masking (DDM) – Mask query results
  • The T-SQL Merge statement
  • From SQL Server to MSMQ using PowerShell
  • Identity columns that are about to overflow

Archives

Categories

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Instagram

This error message is only visible to WordPress admins

Error: No connected account.

Please go to the Instagram Feed settings page to connect an account.

  • © 2021 Tomas Lind
  • Proudly powered by WordPress
  • Theme: Waipoua by Elmastudio
Top ↑