Summary
In this chapter, we discussed the purpose of SQL Server security, what it is, how it can impact your result sets, and how you can verify whether you have the access you need to create your result sets.
We started by discussing how two people can run the same query and get different results and we showed an example of this happening. We then followed that up with a discussion on what SQL Server security is and the primary types of security that impact running queries. We then concluded the chapter by discussing the steps that you, as a user, can take to review your security settings before talking to the DBA to have changes made to security to get the correct results. The skills that you have developed include how to verify your SQL Server security settings, the impact of the settings on your queries, and what steps you would take to change your security settings.
With this knowledge, you are now ready to move on to the next chapter in your SQL journey. The next chapter...