官术网_书友最值得收藏!

Designing and creating security roles in an OLAP database (Intermediate)

Designing and creating are the initial steps to define the security roles, irrespective of the type of database, whether it is a relational-database or analytical-database.

Note

A primary reflection of security roles in a database highlights the behavioral changes of users and schemas separation since SQL Server 2005 version.

In a relational world, schemas are no longer equivalent to database users (they are simply a container of objects) and each schema has a distinct namespace that exists independently of the database user who created it. Such separation enables the administrators to grant necessary privileges on schemas to the corresponding database users.

Similarly, security roles also play very important role in the SSAS world. To manage security for Analysis Services objects and data, a role can be associated to the Security Identifiers (let us refer to them as SIDs) of Windows operating system users and groups that have specific access rights and permissions defined for the objects managed by SSAS instance.

Let us see how to construct security management and fulfill security roles criteria from the first recipe in this instant cookbook.

主站蜘蛛池模板: 凤山县| 肥东县| 枣庄市| 普洱| 全州县| 正蓝旗| 犍为县| 丰县| 苗栗市| 台前县| 德江县| 嘉荫县| 永州市| 宝清县| 道孚县| 巨鹿县| 博兴县| 左贡县| 花垣县| 重庆市| 奇台县| 外汇| 林口县| 全南县| 大余县| 宿州市| 寻乌县| 广州市| 岱山县| 奉贤区| 汶上县| 鄂尔多斯市| 确山县| 宝应县| 丹巴县| 兴国县| 行唐县| 杂多县| 恩施市| 永吉县| 屏东县|