Your SlideShare is downloading. ×
0
How To Secure
Your SQL Server
Gidget Pryor
© 2003 Global Knowledge Network, Inc. All rights reserved. 8/1/2014 Page 1© 201...
© 2014 Global Knowledge Training LLC. All rights reserved.
Gidget Pryor
gidget.pryor@globalknowledge.com
 SQL Server cour...
© 2014 Global Knowledge Training LLC. All rights reserved.
Our Agenda
 SQL Server Multilayered Security Approach
– Discus...
© 2014 Global Knowledge Training LLC. All rights reserved.
Multilayered Security Approach
 Authentication
 Logins
 User...
© 2014 Global Knowledge Training LLC. All rights reserved.
Logins and Users
System Level
Master database
Logins
Windows
SQ...
© 2014 Global Knowledge Training LLC. All rights reserved.
Authentication
 Occurs at the SQL Server Instance Level
 Two ...
© 2014 Global Knowledge Training LLC. All rights reserved.
Logins and Users
 Logins
– Created and stored in the master da...
© 2014 Global Knowledge Training LLC. All rights reserved.
Schemas
 Logical and Security Boundaries Around Objects
 Intr...
© 2014 Global Knowledge Training LLC. All rights reserved.
Roles
 Server Level
– Fixed
• Built in
• Permissions are set
•...
© 2014 Global Knowledge Training LLC. All rights reserved.
Authorization
 Provides Access to a Resource
 Scope
– Server
...
Demonstration:
Multilayered Security
Approach
© 2014 Global Knowledge Training LLC. All rights reserved.
New Security Features in
SQL Server 2012
 User-Defined Server ...
Demonstration:
User-Defined Server Roles
Demonstration:
Contained Databases
© 2014 Global Knowledge Training LLC. All rights reserved.
Questions?
Gidget Pryor
gidget.pryor@globalknowledge.com
www.gl...
© 2014 Global Knowledge Training LLC. All rights reserved.
Learn More
Recommended Global Knowledge
Courses
 Administering...
Thank You for Attending
For more information contact us at:
www.globalknowledge.com | 1-800-COURSES | am_info@globalknowle...
Upcoming SlideShare
Loading in...5
×

How To Secure Your SQL Server

209

Published on

http://tinyurl.com/gksecuresql

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor.

In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

ABOUT THE PRESENTER: Gidget Pryor, SQL Server course director at Global Knowledge, is a SQL Server consultant and instructor with more than 20 years of database, systems engineering, application development, and programming experience. She worked with multiple database platforms including SQL Server, Oracle, DB2, MySQL, FoxPro, Access, and Sybase. She especially enjoys business intelligence and performance tuning.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
209
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "How To Secure Your SQL Server"

  1. 1. How To Secure Your SQL Server Gidget Pryor © 2003 Global Knowledge Network, Inc. All rights reserved. 8/1/2014 Page 1© 2011Global Knowledge Training LLC. All rights reserved.
  2. 2. © 2014 Global Knowledge Training LLC. All rights reserved. Gidget Pryor gidget.pryor@globalknowledge.com  SQL Server course director at Global Knowledge  Has more than 20 years of database, systems engineering, application development, and programming experience  Worked with multiple database platforms, including SQL Server, Oracle, DB2, MySQL, FoxPro, Access, and Sybase  Especially enjoys business intelligence and performance tuning
  3. 3. © 2014 Global Knowledge Training LLC. All rights reserved. Our Agenda  SQL Server Multilayered Security Approach – Discussion – Demonstration  New Security Features in SQL Server 2012 – Discussion – Demonstration
  4. 4. © 2014 Global Knowledge Training LLC. All rights reserved. Multilayered Security Approach  Authentication  Logins  Users  Schemas  Roles – Server – Database  Authorization
  5. 5. © 2014 Global Knowledge Training LLC. All rights reserved. Logins and Users System Level Master database Logins Windows SQL Server User Level User database Users
  6. 6. © 2014 Global Knowledge Training LLC. All rights reserved. Authentication  Occurs at the SQL Server Instance Level  Two Modes – Windows Authentication – Mixed Mode (SQL Server and Windows)
  7. 7. © 2014 Global Knowledge Training LLC. All rights reserved. Logins and Users  Logins – Created and stored in the master database – Two types • Windows • SQL Server – Should be created first  Users – Created in each individual user database – Mapped to a login – Should be created after the login
  8. 8. © 2014 Global Knowledge Training LLC. All rights reserved. Schemas  Logical and Security Boundaries Around Objects  Introduced in SQL Server 2005  Users Have a Default Schema – Explicitly assigned – dbo if not otherwise assigned  SQL Server Uses Schemas for Object Resolution – If there is no qualified schema name, SQL Server: 1. Uses default schema 2. Checks the dbo schema 3. Returns an error if the object isn’t present in either of these
  9. 9. © 2014 Global Knowledge Training LLC. All rights reserved. Roles  Server Level – Fixed • Built in • Permissions are set • Membership is not set – User defined (new in SQL Server 2012)  Database Level – Fixed • Built in • Permissions are set • Membership is not set – User defined
  10. 10. © 2014 Global Knowledge Training LLC. All rights reserved. Authorization  Provides Access to a Resource  Scope – Server – Database – Schema – Object – Element (i.e., column)  Grant, Revoke, Deny  Combining Permissions
  11. 11. Demonstration: Multilayered Security Approach
  12. 12. © 2014 Global Knowledge Training LLC. All rights reserved. New Security Features in SQL Server 2012  User-Defined Server Roles – Ability to group permissions without giving too much access – Flexible permissions – Membership is not set  Contained Databases – Partially contained only – Authentication without a login – Facilitate movement of databases from server to server
  13. 13. Demonstration: User-Defined Server Roles
  14. 14. Demonstration: Contained Databases
  15. 15. © 2014 Global Knowledge Training LLC. All rights reserved. Questions? Gidget Pryor gidget.pryor@globalknowledge.com www.globalknowledge.com/microsoft
  16. 16. © 2014 Global Knowledge Training LLC. All rights reserved. Learn More Recommended Global Knowledge Courses  Administering Microsoft SQL Server 2012 Databases  MCSA: SQL Server 2012 Boot Camp  SQL Server 2008 R2 for Administration Request an On-Site Delivery  We can tailor our courses to meet your needs  We can deliver them in a private setting Visit Our Knowledge Center  Assessments  Blog  Case Studies  Demos  Lab Topologies  Special Reports  Twitter  Videos  Webinars  White Papers
  17. 17. Thank You for Attending For more information contact us at: www.globalknowledge.com | 1-800-COURSES | am_info@globalknowledge.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×