Constantly logging out and back in to test security settings and permissions can be cumbersome. Learn how EXECUTE AS can ease your life.
To determine the active permissions for a connection, SQL Server uses a list of security tokens. Read on to find out what these mysterious tokens are and how to see the list of active ones.
Database roles can greatly simplify permission management on a database level. Learn how to add and remove members and how to retrieve the list of all current members of a database role.
Database roles simplify security management on a database level. With database roles we can grant or deny permissions to a group of database users. Find out how you can use database roles in your environment.
SQL Server knows two types of security principals: The login or server principal and the database user or database principal. Read on to learn more about the server principal.