Today, security is a hot topic. Mistakes can come at a high price, and lead to the loss of customers and business. Almost every day, we hear about some serious data breach. User management is the first point at which the security story actually begins.
SQL Server has a very powerful mechanism for checking user identity. Based on that process, we can configure all other aspects of security from the higher (server) to the lower (database) level.
In this chapter, we will go into more detail about the process of authentication, and authorization, and how to gain access to concrete SQL Server assets (also known as securables).
In this chapter, you will learn the following:
- The authentication process
- The authorization process
- Accessing SQL Server resources
- Schema separation