tailieunhanh - mastering sql server 2000 security PHẦN 5

Khi đăng nhập này là Do truy cập vào cơ sở dữ liệu, người sử dụng cơ sở dữ liệu được tạo ra một cho các nhóm Windows 2000. Trong Enterprise Manager bạn sẽ thấy các đại diện Tập đoàn Toàn bộ như một mục duy nhất. Do đó, nếu bạn là Windows 2000 Cấp quyền truy cập cho các nhóm SQL Server, | Implementing Front-End Application Security Among the primary concerns of database administration is the security level provided by the developers who create the front-end applications. The front-end application is often referred to as the presentation layer. The application that interfaces with the database defines the connection to the database server. The database is only as secure as the connection options that are used in the front-end application. Database administrators should generally be concerned with two related areas. The first area of concern relates to the client tools supplied with SQL Server. Users who have the ability to install the client tools have access to both Enterprise Manager and SQL Query Analyzer. To prevent security violations from one of the client tools you want to control the access each user has to the database. The client tools are interfaces that are created to manipulate both the configuration of SQL Server and its databases. A user can make significant changes to the database management system through the user-friendly client tools. The connection to SQL Server from the client tools is provided by the network libraries and is configured through the Client Network Utility and the Server Network Utility. The second area of concern is the applications that will be used by the clients to perform activity against the database. These applications could 155 156 Chapter 7 either be a connection from a licensed product like Microsoft Excel or Microsoft Access or an application that is created by a developer to specifically interface with SQL Server. Typically the connections made through these applications to SQL Server are made via OLE DB or ODBC. The network library is included with the OLE DB provider or ODBC driver. Many of the security requirements are defined in the connection options through these interfaces. This chapter defines the security requirements for the OLE DB and ODBC drivers. The chapter first addresses the management .

TỪ KHÓA LIÊN QUAN