{"id":2011,"date":"2014-02-13T11:00:42","date_gmt":"2014-02-13T16:00:42","guid":{"rendered":"http:\/\/sqlity.net\/en\/?p=2011"},"modified":"2014-02-09T17:41:00","modified_gmt":"2014-02-09T22:41:00","slug":"deny-vs-revoke-4","status":"publish","type":"post","link":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/","title":{"rendered":"DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges"},"content":{"rendered":"<div>\n<h3>Introduction<\/h3>\n<p>\nOver the last few days we have looked at the difference between <span class=\"tt\">DENY<\/span> and <span class=\"tt\">REVOKE<\/span>, particularly in the context of hierarchies. So far we looked at <a href=\"http:\/\/sqlity.net\/en\/2003\/deny-vs-revoke-2\/\">hierarchies of security principals<\/a> and <a href=\"http:\/\/sqlity.net\/en\/2009\/deny-vs-revoke-3\/\">hierarchies of securables<\/a>. There is one more hierarchy that I would like to cover: The hierarchy of permissions.\n<\/p>\n<h3>Permission Hierarchy Example<\/h3>\n<p>\nIf you look up a specific privilege in Books Online, for example under <a href=http:\/\/technet.microsoft.com\/en-us\/library\/ms188371.aspx target=\"BOL\">Object Permissions<\/a>, you will see next to each specific privilege another privilege that implies the former. Most object privileges are only implied by the CONTROL object privilege, but there are others.\n<\/p>\n<p>\nAs with the other hierarchies that we looked at, this hierarchy can be used to fine tune your permission management. Let's look at a simple example. First we need to create a user and a table:\n<\/p>\n<div>\n[sql]\nCREATE LOGIN TestLogin1 WITH PASSWORD='********', CHECK_POLICY = OFF;<br \/>\nCREATE USER TestUser1 FOR LOGIN TestLogin1;<\/p>\n<p>CREATE TABLE dbo.tst(id INT);<br \/>\nINSERT INTO dbo.tst VALUES(42);<br \/>\n[\/sql]\n<\/p><\/div>\n<p>\nNow we <span class=\"tt\">GRANT CONTROL<\/span> on that table to our user:\n<\/p>\n<p>\n<a href=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg\" alt=\"CONTROL implies SELECT\" width=\"763\" height=\"437\" class=\"aligncenter size-full wp-image-2027\" srcset=\"https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg 763w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT-300x171.jpg 300w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT-150x85.jpg 150w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/a>\n<\/p>\n<p>\nAs you can see, the <span class=\"tt\">CONTROL<\/span> privilege implies the <span class=\"tt\">SELECT<\/span> privilege.\n<\/p>\n<p>\nFollowing the same pattern that we have used with the other two hierarchies, let's try to <span class=\"tt\">REVOKE SELECT<\/span> on that table form <span class=\"tt\">TestUser1<\/span>:\n<\/p>\n<p>\n<a href=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/REVOKE_SELECT_has_no_impact_after_GRANT_CONTROL.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/REVOKE_SELECT_has_no_impact_after_GRANT_CONTROL.jpg\" alt=\"REVOKE SELECT has no impact after GRANT CONTROL\" width=\"763\" height=\"437\" class=\"aligncenter size-full wp-image-2026\" srcset=\"https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/REVOKE_SELECT_has_no_impact_after_GRANT_CONTROL.jpg 763w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/REVOKE_SELECT_has_no_impact_after_GRANT_CONTROL-300x171.jpg 300w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/REVOKE_SELECT_has_no_impact_after_GRANT_CONTROL-150x85.jpg 150w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/a>\n<\/p>\n<p>\nWe had never granted <span class=\"tt\">SELECT<\/span> to <span class=\"tt\">TestUser1<\/span> so we expected the <span class=\"tt\">REVOKE<\/span> to not have any effect on the existing access permissions. The above confirms that we assumed correctly.<br \/>\n<\/P.\n\n\n<p>\nNow let's see if we can use <span class=\"tt\">DENY<\/span> to remove the <span class=\"tt\">SELECT<\/span> privilege:\n<\/p>\n<p>\n<a href=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_overrides_GRANT_of_CONTROL.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_overrides_GRANT_of_CONTROL.jpg\" alt=\"DENY SELECT overrides GRANT CONTROL\" width=\"763\" height=\"437\" class=\"aligncenter size-full wp-image-2029\" srcset=\"https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_overrides_GRANT_of_CONTROL.jpg 763w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_overrides_GRANT_of_CONTROL-300x171.jpg 300w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_overrides_GRANT_of_CONTROL-150x85.jpg 150w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/a>\n<\/p>\n<p>\nThat worked; the <span class=\"tt\">DENY SELECT<\/span> successfully prevented read access on the table in spite of the previously granted <span class=\"tt\">CONTROL<\/span> privilege.\n<\/p>\n<p>\nAs with all other hierarchies we looked at before, a <span class=\"tt\">DENY<\/span> anywhere in the hierarchy overrides any <span class=\"tt\">GRANT<\/span> on a different level.\n<\/p>\n<p>\nJust to clarify however, the <span class=\"tt\">DENY SELECT<\/span> does only affect attempts to read data. Other privileges that are implied by <span class=\"tt\">CONTROL<\/span> are not affected. So, <span class=\"tt\">TestUser1<\/span> is for example still able to execute an <span class=\"tt\">INSERT<\/span> statement against that table:\n <\/p>\n<p>\n<a href=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_does_not_affect_INSERT_after_GRANT_CONTROL.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_does_not_affect_INSERT_after_GRANT_CONTROL.jpg\" alt=\"DENY SELECT does not affect INSERT after GRANT CONTROL\" width=\"763\" height=\"437\" class=\"aligncenter size-full wp-image-2028\" srcset=\"https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_does_not_affect_INSERT_after_GRANT_CONTROL.jpg 763w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_does_not_affect_INSERT_after_GRANT_CONTROL-300x171.jpg 300w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/DENY_SELECT_does_not_affect_INSERT_after_GRANT_CONTROL-150x85.jpg 150w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/a>\n<\/p>\n<p>\nWhile a <span class=\"tt\">DENY<\/span> always overrides a <span class=\"tt\">GRANT<\/span> if executed on different levels of a security hierarchy, the <span class=\"tt\">DENY<\/span> will only affect operations that require either the specific privilege that was denied or any privilege that is implied by it.\n<\/p>\n<h3>Summary<\/h3>\n<p>\nPermission level hierarchies build another security related hierarchy. As with other hierarchies we looked at, a <span class=\"tt\">DENY<\/span> on any level of this type of hierarchy will override any number of grants on other levels.\n<\/p>\n<h3>DENY vs. REVOKE Series<\/h3>\n<p>\nThis post is part of a five-part series comparing the <span class=\"tt\">DENY<\/span> and the <span class=\"tt\">REVOKE<\/span> statements.<br \/>\nBelow is a list of links to the posts that are already available.\n<\/p>\n<div class=\"wp-cpl-sc-wrap wp-cpl-sc-theme-4\">\n        <div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/1993\/deny-vs-revoke-1\/\" title=\"Permalink to: DENY vs. REVOKE - Part 1 - Are they just synonyms?\">DENY vs. REVOKE &#8211; Part 1 &#8211; Are they just synonyms?<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2003\/deny-vs-revoke-2\/\" title=\"Permalink to: DENY vs. REVOKE - Part 2 - Hierarchies of Principals\">DENY vs. REVOKE &#8211; Part 2 &#8211; Hierarchies of Principals<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2009\/deny-vs-revoke-3\/\" title=\"Permalink to: DENY vs. REVOKE - Part 3 - Hierarchies of Securables\">DENY vs. REVOKE &#8211; Part 3 &#8211; Hierarchies of Securables<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/\" title=\"Permalink to: DENY vs. REVOKE - Part 4 - Hierarchies of Privileges\">DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2051\/deny-vs-revoke-5\/\" title=\"Permalink to: DENY vs. REVOKE - Part 5 - Durability\">DENY vs. REVOKE &#8211; Part 5 &#8211; Durability<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management. Read on to get all the details.<\/p>\n<p> <a href=\"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/\">[more&#8230;]<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[104,5,34,27],"tags":[103,275,88,50,98,38,58,15],"class_list":["post-2011","post","type-post","status-publish","format-standard","hentry","category-deny-vs-revoke","category-general","category-security","category-series","tag-deny","tag-deny-vs-revoke","tag-grant","tag-permission","tag-revoke","tag-security-2","tag-security-management","tag-sql-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net<\/title>\n<meta name=\"description\" content=\"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net\" \/>\n<meta property=\"og:description\" content=\"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/\" \/>\n<meta property=\"og:site_name\" content=\"sqlity.net\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sqlity.net\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-13T16:00:42+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg\" \/>\n<meta name=\"author\" content=\"Sebastian Meine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sqlity\" \/>\n<meta name=\"twitter:site\" content=\"@sqlity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Meine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/\"},\"author\":{\"name\":\"Sebastian Meine\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"headline\":\"DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges\",\"datePublished\":\"2014-02-13T16:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/\"},\"wordCount\":264,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/CONTROL_implies_SELECT.jpg\",\"keywords\":[\"DENY\",\"DENY vs. REVOKE\",\"GRANT\",\"Permission\",\"REVOKE\",\"security\",\"security management\",\"SQL Server\"],\"articleSection\":[\"DENY vs. REVOKE\",\"General\",\"Security\",\"Series\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/\",\"name\":\"DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/CONTROL_implies_SELECT.jpg\",\"datePublished\":\"2014-02-13T16:00:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"description\":\"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#primaryimage\",\"url\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/CONTROL_implies_SELECT.jpg\",\"contentUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/CONTROL_implies_SELECT.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2011\\\/deny-vs-revoke-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\",\"name\":\"sqlity.net\",\"description\":\"Quality for SQL\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sqlity.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\",\"name\":\"Sebastian Meine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"caption\":\"Sebastian Meine\"},\"sameAs\":[\"http:\\\/\\\/sqlity.net\",\"https:\\\/\\\/x.com\\\/sqlity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net","description":"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/","og_locale":"en_US","og_type":"article","og_title":"DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net","og_description":"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.","og_url":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/","og_site_name":"sqlity.net","article_publisher":"https:\/\/www.facebook.com\/sqlity.net","article_published_time":"2014-02-13T16:00:42+00:00","og_image":[{"url":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg","type":"","width":"","height":""}],"author":"Sebastian Meine","twitter_card":"summary_large_image","twitter_creator":"@sqlity","twitter_site":"@sqlity","twitter_misc":{"Written by":"Sebastian Meine","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#article","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/"},"author":{"name":"Sebastian Meine","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"headline":"DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges","datePublished":"2014-02-13T16:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/"},"wordCount":264,"commentCount":0,"image":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#primaryimage"},"thumbnailUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg","keywords":["DENY","DENY vs. REVOKE","GRANT","Permission","REVOKE","security","security management","SQL Server"],"articleSection":["DENY vs. REVOKE","General","Security","Series"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/","url":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/","name":"DENY vs. REVOKE - Part 4 - Hierarchies of Privileges - sqlity.net","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#primaryimage"},"image":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#primaryimage"},"thumbnailUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg","datePublished":"2014-02-13T16:00:42+00:00","author":{"@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"description":"This fourth part of the short series about DENY vs. REVOKE shows that a DENY on the hierarchy of privileges can be used to fine tune permission management.","breadcrumb":{"@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#primaryimage","url":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg","contentUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/02\/CONTROL_implies_SELECT.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sqlity.net\/en\/2011\/deny-vs-revoke-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sqlity.net\/en\/"},{"@type":"ListItem","position":2,"name":"DENY vs. REVOKE &#8211; Part 4 &#8211; Hierarchies of Privileges"}]},{"@type":"WebSite","@id":"https:\/\/sqlity.net\/en\/#website","url":"https:\/\/sqlity.net\/en\/","name":"sqlity.net","description":"Quality for SQL","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sqlity.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c","name":"Sebastian Meine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","caption":"Sebastian Meine"},"sameAs":["http:\/\/sqlity.net","https:\/\/x.com\/sqlity"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2wXuw-wr","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/comments?post=2011"}],"version-history":[{"count":0,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2011\/revisions"}],"wp:attachment":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/media?parent=2011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/categories?post=2011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/tags?post=2011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}