官术网_书友最值得收藏!

Designing and creating security roles in an OLAP database (Intermediate)

Designing and creating are the initial steps to define the security roles, irrespective of the type of database, whether it is a relational-database or analytical-database.

Note

A primary reflection of security roles in a database highlights the behavioral changes of users and schemas separation since SQL Server 2005 version.

In a relational world, schemas are no longer equivalent to database users (they are simply a container of objects) and each schema has a distinct namespace that exists independently of the database user who created it. Such separation enables the administrators to grant necessary privileges on schemas to the corresponding database users.

Similarly, security roles also play very important role in the SSAS world. To manage security for Analysis Services objects and data, a role can be associated to the Security Identifiers (let us refer to them as SIDs) of Windows operating system users and groups that have specific access rights and permissions defined for the objects managed by SSAS instance.

Let us see how to construct security management and fulfill security roles criteria from the first recipe in this instant cookbook.

主站蜘蛛池模板: 宣汉县| 固原市| 舞钢市| 陈巴尔虎旗| 金山区| 顺平县| 丹寨县| 万山特区| 文昌市| 三江| 沐川县| 东光县| 蒙阴县| 治多县| 新郑市| 拉萨市| 文安县| 中山市| 夏河县| 藁城市| 荆州市| 密山市| 克山县| 宁国市| 沙坪坝区| 通道| 静海县| 同江市| 庆云县| 隆回县| 始兴县| 台湾省| 东乡| 泉州市| 临高县| 宜阳县| 绵阳市| 靖州| 罗江县| 绥棱县| 中超|