1. Trang chủ
  2. » Công Nghệ Thông Tin

SQL Server - Bài5

84 256 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 84
Dung lượng 1,61 MB

Nội dung

SQL Server - Bài

Securing Databases &T-SQL for Data Control Vu Tuyet Trinhtrinhvt-fit@mail.hut.edu.vnHanoi University of Technology1 MicrosoftMicrosoftOutlineUnderstanding SQL Server Security Model Managing logins, users and roles Managing PermissionsData Control Language (DCL) and Security IssuesImplementing Security through Database ObjectsOther Security OptionsColumn Level EncryptionProxy AccountsCredentials MicrosoftMicrosoftSQL Server Security Model MicrosoftMicrosoftSQL Server Security OverviewLayered Security Model:Windows LevelSQL Server LevelDatabaseSchemas (for database objects)Terminology:PrincipalsSecurablesPermissionsScopes and Inheritance MicrosoftMicrosoftPrincipalsSecurable Permissions MicrosoftMicrosoftPrincipals, Securable and PermissionsPrincipal Individuals, groups, and processes that can request SQL Server resources.Logins, Users, Roles, etcSecurableA Securable is a resource that can be securedTables, Views, Endpoints, etcPermissionPermissions grant principals access to securablesGrant a user Execute rights to a Stored Procedure, etcSQL 2005 introduces new permissions like Control, Alter Any and ImpersonatePermissions work in hierarchies MicrosoftMicrosoftSecurity Architecture in SQL Server 2000AuthenticationFirst stage of securityIdentifies users based on login information they provideOnly verifies that users can connect to a SQL Server 2000 instanceDoes not provide access to databases and their objectsAuthorizationSecond stage of securityOccurs when database permissions are checked to determine which actions a particular user can perform within a database MicrosoftMicrosoftOutline√Understanding the security architecture of SQL ServerManaging logins, users and rolesManaging permissionsControlling access with database objects and ownership chainsAuditing SQL Server MicrosoftMicrosoftSQL Server Service AccountsLocal Service AccountPermissions of “Users” group (limited)No network authenticationNetwork Service AccountPermissions of Users groupNetwork authentication with Computer accountDomain User AccountsAdds network access for cross-server functionality MicrosoftMicrosoftCreating LoginsTransact-SQL CREATE LOGIN statementReplaces sp_AddLogin and sp_GrantLoginSQL Server LoginsWindows LoginsSQL Server Management StudioSetting server authentication optionsLogin AuditingManaging Logins [...]... of the role SQL Server Management Studio  Microsoft Working with Users and Roles Built-In Server / Database Roles Microsoft Configuring Permissions    Scopes of Securables  Server  Database  Schema  Objects Permission Settings:  GRANT  REVOKE  DENY Options  WITH GRANT OPTION  AS (Sets permissions using another user or role) Microsoft Managing Execution Permissions  Transact -SQL Code can... Figure 8-1 2: Ownership chain Microsoft Other Security Options  Database Encryption    SQL Server Agent   Encrypting Object Definitions Data encryption Proxies based on subsystems allow lock-down by job step types Preventing SQL Injection attacks  Microsoft Use application design best practices Password Policies  You can now use windows password policies for SQL accounts (note that SQL accounts... rules Windows Server 2003 or higher Enforcement can be decided on a per-login basis This feature is not enforced by default Logins upgraded from SQL 2000 will not have this turned on Microsoft Credentials Overview    A credential is a record that contains the authentication information required to connect to a resource outside of SQL Server  Generally it maps to a Windows login SQL Server logins... Credentials Benefits    Giving SQL Server accounts access to OS resources Creating SQL Agent proxies Giving applications access to other SQL services (SSAS, SSRS, SSIS) Microsoft Agent Proxy Accounts      Defines the security context for a job step SQL 2000 – only one proxy account available for all jobs Generally this account had very high levels of privileges SQL 2005 – Many proxy accounts that... procedures and user-defined functions  Stored procedures and user-defined functions allow sets of TSQL statements to be stored and executed as a single unit  Microsoft They are typically used to enforce business rules or perform logic Implementing Security through Database Objects  Controlling access with triggers  Triggers are similar to stored procedures in that they contain saved groups of T -SQL statements... Authentication/Policy managed by Windows SQL Server Logins  Managed by SQL Server   Password Policy Options:     Microsoft Based on Windows policies HASHED (pw is already hashed) MUST_CHANGE CHECK_EXPIRATION CHECK_POLICY Database Users and Roles  Database Users   Logins map to database users Database Roles Users can belong to multiple roles  Guest (does not require a user account)  dbo (Server sysadmin users)... explicitly used Microsoft Agent Proxy Accounts SQLAgentUser Role SQL Login Grant Logon as Batch Microsoft Credential Windows Login Give Access Proxy Principal Agent Proxy Accounts Subsystems           ActiveX Script Operating System Replication Distributor Replication Merge Replication Queue Reader Replication Snapshot Replication Transaction-Log Reader Analysis Services Command Analysis . AccountsCredentials MicrosoftMicrosoftSQL Server Security Model MicrosoftMicrosoftSQL Server Security OverviewLayered Security Model:Windows Level SQL Server LevelDatabaseSchemas. for cross -server functionality MicrosoftMicrosoftCreating LoginsTransact -SQL CREATE LOGIN statementReplaces sp_AddLogin and sp_GrantLogin SQL Server LoginsWindows

Ngày đăng: 15/11/2012, 10:59

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w