SQL Server provides an effective method for adding users in SQL Server and for managing data and information so that it can easily be stored and retrieved from the underlying files in order to provide the functionality it is designed for.
Once the database is designed, configured and implemented, it is critical that you start adding users in SQL Server so that people needing access to the data or specific bits of data be granted access to what they need to be able to access.
This is increasingly important as the need for more secure practices, guidelines and policies becomes a greater force in the workplace. Security has become more prevalent in the day-to-day operations of practically every organization in the world.
So how can SQL Server and itsí built in security allow for a more secure organization and help to protect the data that we are trying to guard?
Working with SQL Server and the security it has within it is a critical component of database administration. Adding users in SQL Server is an important task.
When adding users in SQL Server, it provides three methods of authenticating users within the database that can be implemented in order to control how users are granted access to the database.
These three methods are windows authentication, SQL Server authentication and mixed-mode authentication.
Windows authentication performs a check of the user credentials with a network validation to ensure that the user has access to the resource.
SQL Server authentication requires a valid SQL Server login name and password combination to validate the user access against the database before granting access to the resources on the server.
Mixed mode security will allow the user to connect to the database via a valid Windows account or through a valid SQL Server login. The type of security you implement depends on the type of security architecture you decide is best for your specific needs on the server and the network.
In order to configure security in SQL Server, the administrator may have to use not only tools within SQL Server but must also work with network accounts in order to grant access and adding users in SQL Server correctly.
In order to view the logins that are used and defined within SQL Server using Enterprise Manager, select the Security node within Enterprise Manager. The Logins node within Security will allow you to view the logins defined within that database.
The illustration below shows the screen and the information that it will provide anyone who looks at it.
The first column is the name of the login as it is known by the database. The type column is next and depicts what type of login it happens to be within the database.
The following column tells whether or not the login has access to the server. This is the Server Access column.
The next two columns deal with default settings for the user within the server. These settings deal with the database that serves as the default database for that login and the default language that is associated with that account.