Abstract
Although a large amount of security metadata can be viewed from SQL Server Management Studio, there is some metadata that can only be viewed using T-SQL. Even for metadata that can be viewed through the GUI, such as the roles that a database user belongs to, there are times that it is best to use T-SQL; for example, if you need to script an action that you perform on a regular basis, or if you need to review metadata for many principals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Peter A. Carter
About this chapter
Cite this chapter
Carter, P.A. (2016). Security Metadata. In: Securing SQL Server. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2265-2_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2265-2_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2264-5
Online ISBN: 978-1-4842-2265-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books