SQL Server role member identities and permissions

Source: Internet
Author: User
Tags ssis

To facilitate the management of database permissions,SQL ServerSeveral "Roles" are provided, which are security subjects used to group other subjects. They are similar to groups in Microsoft Windows operating systems. The permission scope of a database-level role is the database scope. SQL Server has two types of database-level roles: pre-defined"Fixed database role"And the" flexible database role "that you can create ".

A fixed database role is defined at the database level and exists in each database. Members of the db_owner and db_securityadmin database roles can manage fixed database role identities. However, only members of the db_owner database role can add members to the db_owner fixed database role. MSDB databases also have some special-purpose fixed database roles. You can add any database account and other SQL Server roles to a database-level role. Each member of a fixed database role can add other login names to the same role.

Database-level role name and description

Members of the db_owner fixed database role can perform all database configuration and maintenance activities and delete the database.

Members of the db_securityadmin fixed database role can modify the role Member identity and Management permissions. Adding a principal to this role may lead to unexpected permission upgrades.

Members of the db_accessadmin fixed database role can add or delete database access permissions for the Windows logon name, Windows Group, and SQL Server logon name.

Members of the db_backupoperator fixed database role can back up the database.

Members of the db_ddladmin fixed database role can run any Data Definition Language (DDL) command in the database.

Members of the db_datawriter fixed database role can add, delete, or change data in all user tables.

Members of the db_datareader fixed database role can read all data from all user tables.

Members of the db_denydatawriter fixed database role cannot add, modify, or delete any data in the User table in the database.

Members of the db_denydatareader fixed database role cannot read any data from the user table in the database.

For specific information on database-level fixed role permissions, see fixed database role permissions (database engine ).

MSDB role name and description

Db_ssisadmin

Db_ssisoperator

Db_ssisltduser

Members of these database roles can manage and use SSIs. An SQL server instance upgraded from an earlier version may containAn old role named after ta transformation services (DTS) instead of SSIs. For more information, see use the integration services role.

Dc_admin

Dc_operator

Dc_proxy

Members of these database roles can manage and use data collectors. For more information, see Data Collector security.

Policyadministratorrole

Members of the DB _ policyadministratorrole database role can perform all configuration and maintenance activities on policy-based management policies and conditions. For more information, see manage servers using policy-based management.

Servergroupadministratorrole

Servergroupreaderrole

Members of these database roles can manage and use registered server groups. For more information, see create a server group.

Important:

Members of the db_ssisadmin and dc_admin roles may be able to escalate their permissions to SysAdmin. This permission improvement occurs because these roles can modify the integration services package, while SQL server can use the SysAdmin security context of the SQL Server proxy to execute the integration services package. To prevent this permission escalation when running maintenance plans, data collection groups, and other integration services packages, configure the SQL Server proxy job of the running package to use a proxy account with limited permissions, or add only SysAdmin MEMBERS TO THE db_ssisadmin and dc_admin roles.

Use server-level roles

Sp_helpdbfixedrole (TRANSACT-SQL) → metadata → return the list of fixed database roles.

Sp_dbfixedrolepermission (TRANSACT-SQL) → metadata → display the permissions of a fixed database role.

Sp_helprole (TRANSACT-SQL) → metadata → return information about roles in the current database.

Sp_helprolemember (TRANSACT-SQL) → metadata → return information about members of a role in the current database.

SYS. database_role_members (TRANSACT-SQL) → metadata → returns a row for each member of each database role.

Is_member (TRANSACT-SQL) → metadata → indicates whether the current user is a member of the specified Microsoft Windows Group or Microsoft SQL Server database role.

Create role (TRANSACT-SQL) → command → create a new database role in the current database.

Alter role (TRANSACT-SQL) → command → change the name of the database role.

Drop role (TRANSACT-SQL) → command to delete a role from the database.

Sp_addrole (TRANSACT-SQL) → command → create a new database role in the current database.

Sp_droprole (TRANSACT-SQL) → command → delete a database role from the current database.

Sp_addrolemember (TRANSACT-SQL) → command → Add a database user, database role, Windows login name, or Windows Group to the database role in the current database.

Sp_droprolemember (TRANSACT-SQL) → command → Delete the security account from the SQL Server role of the current database.

Public database role

Each database user belongs to the public database role. If a user is not granted or denied specific permissions on a security object, the user inherits the permissions granted to the public role of the object.

This article will introduce you here. Due to my limited level, if you have any improper descriptions in this article, you are welcome to criticize and correct me. Thank you.

 

 

This article from: http://database.51cto.com/art/201107/276065.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.