Nóta
Teastaíonn údarú chun rochtain a fháil ar an leathanach seo. Is féidir leat triail a bhaint as shíniú isteach nó eolairí a athrú.
Teastaíonn údarú chun rochtain a fháil ar an leathanach seo. Is féidir leat triail a bhaint as eolairí a athrú.
The SQL Server 2005 Database Engine helps you protect data from unauthorized disclosure and tampering. The SQL Server Database Engine security functionality includes highly granular authentication, authorization, and validation mechanisms; strong encryption; security context switching and impersonation; and integrated key management. The following table lists important security-related topics.
| Topic | Description |
|---|---|
Describes SQL Server compliance with the Common Criteria and FIPS 140-2. |
|
Describes individuals, groups, and processes that can request SQL Server resources. |
|
Describes the resources to which the SQL Server Database Engine authorization system regulates access. |
|
Describes the highly precise permissions that can be granted to principals on securables. |
|
Describes the hierarchy of securable entities and scoping mechanisms. |
|
Provides the Transact-SQL syntax for granting permissions on system stored procedures, functions, catalog views, and other system objects. |
|
Provides an overview of encryption and integrated key management. |
|
Explains the improved consistency in the handling of entity ownership, schema behavior, and name resolution. |
|
Describes mechanisms for changing security context within a single connection. |
|
Describes how access to underlying tables or objects can be restricted by using module signing. |
|
Provides an overview of the security-related aspects of CLR Integration |
|
Lists security-related metadata visible in catalog views that are optimized for performance and utility. |
|
Lists the functions that return information useful in managing security. |
|
Lists the functions that support encryption, decryption, digital signing, and the validation of digital signatures. |
|
Explains password complexity and expiration policies. |
|
Explains what you can do to help keep your backups safe. |
See Also
Other Resources
Security Considerations for a SQL Server Installation
Securing SQL Server
Security Tutorials