In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-09-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
1. Security mechanism of SQL:
① client Security: system Security
② server security: login to SQL instance security
③ database security: access database security
④ object security: operational security for database objects
2. Server security: security permissions of login account
Verification method:
Windows authentication: the account must be a system account and added as a SQL user
SQL authentication: users created in SQL
Permission settings: valid for the entire instance and managed by roles
Fixed role of the server:
Sysadmin: execute task activities, administrators attribute group
Serveradmin: startup of the management server
Diskadmin: managing disk files
Dbcreator: managing databases
Public: only allowed to log in to the database, the default role of ordinary users, the default database is master
3. Database security:
Acting on a single database, you must become a database user to be authorized, and the login account must be mapped to a database user.
Built-in database users:
Dbo: the creator of the database, and the owner has arbitrary permissions on the data
Guest: guest user, disabled by default
Permission settings: granted through database roles
The main fixed roles are:
Db_datareader: read, query
Db_datawriter: changing permissions
Db_ddladmin: create, delete, change object permissions
Db_owner: owner, arbitrary permission
4. Object-level permissions:
Acting on the specified object, the permissions are more detailed.
5. Backup type:
Full backup: back up all data, log files, etc.
Differential backup: backing up updated data since the last full backup
Transaction log backups: backing up SQL statements
6. Recovery model:
① simple recovery model: only restore data files, do not support log file recovery, can only restore to the data backup point
② full recovery model: can restore data backup or log backup, can restore to the point of failure
③ bulk log recovery model: suitable for mass updates and can only be restored to the backup point
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about
The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r
A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.