Skip to main content

Security Metadata

  • Chapter
  • First Online:
Securing SQL Server
  • 1127 Accesses

Abstract

Although a large amount of security metadata can be viewed from SQL Server Management Studio, there is some metadata that can only be viewed using T-SQL. Even for metadata that can be viewed through the GUI, such as the roles that a database user belongs to, there are times that it is best to use T-SQL; for example, if you need to script an action that you perform on a regular basis, or if you need to review metadata for many principals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Peter A. Carter

About this chapter

Cite this chapter

Carter, P.A. (2016). Security Metadata. In: Securing SQL Server. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2265-2_6

Download citation

Publish with us

Policies and ethics