473,396 Members | 1,785 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Articles on Dynamic SQL and certificates/impersonation

My article on dynamic SQL, "The Curse and Blessings of Dynamic SQL" is
frequently referred to in these newsgroups. I like to announce that I
have rewritten this article thoroughly. I started off with revising it
for SQL 2005, but the more I looked at it, I felt that it was time for a
major overhaul. After all, I wrote the initial version with a mindset of
SQL 6.5.

The URL is the same: http://www.sommarskog.se/dynamic_sql.html.

At the same time, I like to announce a new article, Granting Permissions
through Stored Procedures, http://www.sommarskog.se/grantperm.html. I wrote
this article since SQL 2005 offers two ways to use dynamic SQL in stored
procedures without giving direct table permissions to users. One method
is simpler than the other, but the simple method has some serious side-
effects. I cover these two methods, certificates and impersonation as well
as the classic ownership chaining in this article, and I also briefly
cover owner/schema separation and application roles.
--
Erland Sommarskog, SQL Server MVP, es****@sommarskog.se

Books Online for SQL Server 2005 at
http://www.microsoft.com/technet/pro...ads/books.mspx
Books Online for SQL Server 2000 at
http://www.microsoft.com/sql/prodinf...ons/books.mspx
Apr 23 '06 #1
0 1022

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Erland Sommarskog | last post by:
Since a few people refer to the articles on my web site, I've acquired a less cumbersome URL. Now you can refer to them as http://www.sommarskog.se/dynamic_sql.html etc. The old URL will...
1
by: Next | last post by:
Hello, I sure could use someone's help : ) I need to authenticate users and securely upload files from laptops on the internet ( not on the same domain as server ) to a server on my domain....
12
by: Anil Krishnamurthy | last post by:
We have an ASP.NET application that uses COM objects through Interop. The web application requires access to network and database resources and hence, needs to impersonate a domain account. The...
1
by: techfuzz | last post by:
I'm posting my problem experience and solution I found here for other ASP.NET developers. I have a web application that uses Forms Authentication with Active Directory to control access. In...
2
by: Mong | last post by:
Hi, I've developed an ASP.net application for an intranet site. Users will be identified using Windows authentication and they will belong to one of two roles, Admin or Users. The application...
0
by: dinoo | last post by:
Can some body help me out? I am trying to use client certificates in a Webservice. But some how i am not able to make it. I went through the msdn resources but i think some one needs to help me...
5
by: | last post by:
Hi all, HttpWebRequest, and SoapHttpClientProtocol both expose a ClientCertificates property, which can hold multiple client certificates, but on the service side, it can only receive one client...
2
by: Rune Nergard | last post by:
I have tried to use the System.Security.Cryptography.Xml.SignedXml class to sign an Xml message with Xml-DSIG and using an Enveloped signature type and the sha1RSA algorithm. Everything works fine...
1
by: Tor Inge Rislaa | last post by:
Dynamic Articles from a Database Hi, I have a website containing one webform (default.aspx) and a database containing one table (articles) the table contains only 4 field's id, tittles,...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.