官术网_书友最值得收藏!

Designing and creating security roles in an OLAP database (Intermediate)

Designing and creating are the initial steps to define the security roles, irrespective of the type of database, whether it is a relational-database or analytical-database.

Note

A primary reflection of security roles in a database highlights the behavioral changes of users and schemas separation since SQL Server 2005 version.

In a relational world, schemas are no longer equivalent to database users (they are simply a container of objects) and each schema has a distinct namespace that exists independently of the database user who created it. Such separation enables the administrators to grant necessary privileges on schemas to the corresponding database users.

Similarly, security roles also play very important role in the SSAS world. To manage security for Analysis Services objects and data, a role can be associated to the Security Identifiers (let us refer to them as SIDs) of Windows operating system users and groups that have specific access rights and permissions defined for the objects managed by SSAS instance.

Let us see how to construct security management and fulfill security roles criteria from the first recipe in this instant cookbook.

主站蜘蛛池模板: 竹北市| 方山县| 双流县| 华坪县| 油尖旺区| 建水县| 连平县| 西平县| 和龙市| 清苑县| 天祝| 会昌县| 图木舒克市| 新绛县| 宜兰县| 海宁市| 清远市| 嘉善县| 札达县| 平阳县| 翁源县| 抚顺县| 黑水县| 左贡县| 连江县| 达日县| 乐至县| 静安区| 神农架林区| 南皮县| 丰台区| 准格尔旗| 大丰市| 随州市| 勃利县| 山东省| 呼图壁县| 聂拉木县| 乐平市| 镇巴县| 邹平县|