Free Essay

Sql Server Authentication

In:

Submitted By movic99
Words 2311
Pages 10
Windows Authentication on Microsoft SQL Server
Introduction
Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication authenticates the user to the database using a database user name and password. Windows authentication is also referred to as "Windows Integrated Security" or a "trusted connection" because it relies on the user being authenticated, or “trusted,” by the operating system. Windows authentication is the authentication mode recommended by Microsoft. Windows authentication takes advantage of Windows user security and account mechanisms. By allowing Microsoft SQL Server to share the user name and password used for Windows, users with a valid Windows account can log into Microsoft SQL Server without supplying a user name and password. In addition to a single login within a Windows domain, Windows authentication provides a more secure mechanism for logging into Microsoft SQL Server. Standard Windows security mechanisms also provide the added advantages of auditing, password aging, minimum password length, and account lockout after multiple invalid login requests. The DataDirect Connect® for JDBC® SQL Server driver is the only JDBC driver for Microsoft SQL Server that provides two methods for supporting Windows authentication, a Pure Java (Type 4) implementation and a Windows-specific (Type 2) implementation. The Windows-specific implementation requires minimal configuration to enable Windows authentication; however, it can only be used when the driver is running on a Windows platform. The Pure Java implementation is not restricted to Windows platforms, but requires configuration of your Kerberos environment. This document describes both types of Windows authentication methods supported by the DataDirect Connect for JDBC SQL Server driver and provides an overview of the configuration required to use each method. Finally, it describes the current limitations and future enhancements planned for this functionality.

Choosing a Windows Authentication Mechanism
The DataDirect Connect for JDBC SQL Server driver provides the following methods for supporting Windows authentication: • Pure Java (Type 4) authentication supports connections in a Windows domain running Windows Active Directory. The DataDirect Connect for JDBC SQL Server driver is the only JDBC driver on the market that supports Windows authentication while remaining a pure Type 4 JDBC driver. DataDirect Technologies has a patent pending on this innovative technology. This authentication method supports Kerberos authentication, an authentication protocol that is an integral component of Windows Active Directory.

W I N D O W S

A U T H E N T I C A T I O N

O N

M I C R O S O F T

S Q L

S E R V E R



Windows-specific (Type 2) authentication requires that the DataDirect Connect for JDBC SQL Server driver be installed on a Windows client; however, it supports both NT LAN Manager (NTLM) and Kerberos authentication.

The Pure Java authentication method is important to many Java developers because it eliminates the need to install database-specific client libraries or additional shared libraries. It requires J2SE 1.4 or higher and knowledge of how to configure Windows Active Directory and Kerberos to support this functionality. The Windows-specific method requires J2SE 1.2 or higher and requires minimal configuration. In addition, it can be used in both Windows Active Directory and NTLM domains.

Configuring for Pure Java Windows Authentication
Pure Java Windows authentication supports connections to Microsoft SQL Server 2000 and Microsoft SQL Server 2000 Enterprise Edition (64-bit) SP2 or higher in a Windows domain running Windows Active Directory. This authentication method supports Kerberos authentication, an authentication protocol that is an integral component of Windows Active Directory.

Setting the AuthenticationMethod Property
You set the DataDirect Connect for JDBC SQL Server driver's AuthenticationMethod connection property to control which authentication method is used by the driver. For example, the following connection URL specifies that Pure Java Windows authentication will be used for the connection if a user name is not specified: jdbc:datadirect:sqlserver://server1:1433;AuthenticationMethod=type4 Alternatively, you can configure the driver to automatically select the appropriate Windows authentication method to use for the connection based on a combination of criteria, such as whether the application provides a user ID, the driver is running on a Windows platform, and the driver can load the DLL required for Windows-specific Windows authentication. For example: jdbc:datadirect:sqlserver://server1:1433;AuthenticationMethod=auto For more information about setting the AuthenticationMethod connection property, refer to the DataDirect Connect for JDBC User's Guide and Reference.

Configuring Your Kerberos Environment
To use Pure Java Windows authentication with the DataDirect Connect for JDBC SQL Server driver, configuration is required on the Microsoft SQL Server database server, the domain controller, and the client machine as summarized in Table 1. DataDirect Connect for JDBC performs some of this configuration for you during installation.

2 OF 6

D A T A D I R E C T

T E C H N O L O G I E S

OCTOBER 2005

W I N D O W S

A U T H E N T I C A T I O N

O N

M I C R O S O F T

S Q L

S E R V E R

Table 1: Configuring Your Kerberos Environment for Pure Java Windows Authentication
Component Domain controller Configuration • Make sure that the Active Directory encryption property is set to use DES encryption in the Microsoft SQL Server Service Startup Account. Make sure that a Service Principal Name (SPN) has been created for each Microsoft SQL Server instance to allow the Kerberos Key Distribution Center (KDC) to provide authentication to your Microsoft SQL Server database. Set the authentication mode to Windows Only or Mixed authentication. Configure the login properties of the user IDs and passwords used to log on the database server and for the Service Startup Account used to start the Microsoft SQL Server instance. Modify the Kerberos configuration file to reference your environment. A login configuration file is automatically installed and configured when you install DataDirect Connect for JDBC.



Microsoft SQL Server database server

• •

Client

• •

For more information about configuring your environment for Pure Java Windows authentication, including detailed instructions for each of these configuration steps, refer to the DataDirect Connect for JDBC User's Guide and Reference.

Configuring for Windows-Specific Authentication
Windows-specific authentication requires that the DataDirect Connect for JDBC SQL Server driver be installed on a Windows client; however, it supports both NTLM and Kerberos authentication for Microsoft SQL Server 2000 SP3 or higher and Microsoft SQL Server 2000 Enterprise Edition (64-bit) SP2 or higher.

Setting the AuthenticationMethod Property
You set the DataDirect Connect for JDBC SQL Server driver's AuthenticationMethod connection property to control which authentication method is used by the driver. For example, the following connection URL specifies that Windows-specific Windows authentication will be used for the connection if a user name is not specified: jdbc:datadirect:sqlserver://server1:1433;AuthenticationMethod=type2 Alternatively, you can configure the driver to automatically select the appropriate Windows authentication method to use for the connection based on a combination of criteria, such as whether the application provides a user ID, the driver is running on a Windows platform, and the driver can load the DLL required for Windows-specific Windows authentication. For example: jdbc:datadirect:sqlserver://server1:1433;AuthenticationMethod=auto D A T A D I R E C T

T E C H N O L O G I E S

OCTOBER 2005

3 OF 6

W I N D O W S

A U T H E N T I C A T I O N

O N

M I C R O S O F T

S Q L

S E R V E R

For more information about setting the AuthenticationMethod connection property, refer to the DataDirect Connect for JDBC User's Guide and Reference.

Using the Windows-Specific Authentication DLL
To use Windows-specific authentication with the DataDirect Connect for JDBC SQL Server driver, copy the appropriate Windows-specific authentication DLL to a directory on the Windows system path on the machine where you have installed the driver. DataDirect Connect for JDBC provides two Windows-specific authentication DLLs, a 32-bit and a 64bit version. If the application using Windows-specific Windows authentication is running in a 32-bit Java Virtual Machine (JVM), the driver uses the 32-bit version of the DLL. Similarly, if the application is running in a 64-bit JVM, the driver uses the 64-bit version. Alternatively, you can set the java.libary.path system property to specify the directory of the Windows-specific authentication DLL. For example, if the DataDirect Connect for JDBC SQL Server driver is installed in a directory named "DataDirect," you can specify the location of the DLL by using the following Virtual Machine argument when the Java application is started:
-Djava.library.path=C:\DataDirect\lib

For more information about configuring your environment for Windows-specific authentication, refer to the DataDirect Connect for JDBC User's Guide and Reference.

Using Windows Authentication with a Security Manager
If the DataDirect Connect for JDBC SQL Server driver is used on a Java 2 Platform with a Security Manager, you must grant certain permissions to the DataDirect Connect for JDBC SQL Server driver in the security policy file of the Java 2 Platform. The security policy file is located in the jre/lib/security subdirectory of the Java 2 Platform installation directory. The permissions that must be granted depend on whether the driver is using Pure Java or Windows-specific Windows authentication.

Pure Java Windows Authentication
For Pure Java authentication, security permissions must be granted to the application and the driver. For example: grant codeBase "file:/Program Files/DataDirect/Connect for JDBC/lib/-" { permission javax.security.auth.AuthPermission "createLoginContext.DDTEK-JDBC"; permission javax.security.auth.AuthPermission "doAs"; permission javax.security.auth.kerberos.ServicePermission "krbtgt/Kerb_realm1@Kerb_realm1", "initiate"; permission javax.security.auth.kerberos.ServicePermission "MSSQLSvc/SQLServer_server1:1433@Kerb_realm1", "initiate"; };

4 OF 6

D A T A D I R E C T

T E C H N O L O G I E S

OCTOBER 2005

W I N D O W S

A U T H E N T I C A T I O N

O N

M I C R O S O F T

S Q L

S E R V E R

Windows-Specific Windows Authentication
For Windows-specific authentication, the only permission that must be granted is one to allow the driver to establish connections. For example: grant codeBase "file:/Program Files/DataDirect/Connect for JDBC/lib/-" { permission java.net.SocketPermission "*", "connect"; };

In addition, if Microsoft SQL Server named instances are used, permission must be granted for the listen and accept actions as shown in the following example: grant codeBase "file:/Program Files/DataDirect/Connect for JDBC/lib/-" { permission java.net.SocketPermission "*", "listen, connect, accept"; };

Future Enhancements
Currently, DataDirect Connect for JDBC supports Windows authenticated connections to Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Enterprise Edition (64-bit) from a Windows client. For future versions of the DataDirect Connect for JDBC drivers, the current Windows Authentication functionality will be enhanced to support: • • • Pure Java authentication from UNIX clients MIT Kerberos KDC support Pure Java authentication for DB2, Oracle, and Sybase

Conclusion
The DataDirect DataDirect Connect for JDBC SQL Server driver is the only JDBC driver for Microsoft SQL Server that provides two methods for supporting Windows authentication, a Pure Java (Type 4) implementation and a Windows-specific (Type 2) implementation. Both methods of Windows authentication supported by the DataDirect Connect for JDBC driver provide secure connections for your applications to Microsoft SQL Server.

We welcome your feedback! Please send any comments concerning documentation, including suggestions for other topics that you would like to see, to: docgroup@datadirect.com

D A T A D I R E C T

T E C H N O L O G I E S

OCTOBER 2005

5 OF 6

W I N D O W S

A U T H E N T I C A T I O N

O N

M I C R O S O F T

S Q L

S E R V E R

FOR MORE INFORMATION

800-876-3101
Worldwide Sales
Belgium (French) ..............0800 12 045 Belgium (Dutch)................0800 12 046 France .............................0800 911 454 Germany .....................0800 181 78 76 Japan ..............................0120.20.9613 Netherlands ..................0800 022 0524 United Kingdom ..........0800 169 19 07 United States..................800 876 3101

Copyright © 2005 DataDirect Technologies Corp. All rights reserved. DataDirect Connect is a registered trademark of DataDirect Technologies Corp. in the United States and other countries. DataDirect XQuery is a trademark of DataDirect Technologies Corp. in the U.S. and other countries. Java and all Java based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Other company or product names mentioned herein may be trademarks or registered trademarks of their respective companies.

DataDirect Technologies is focused on standards-based data connectivity, enabling software developers to quickly develop and deploy business applications across all major databases and platforms. DataDirect Technologies offers the most comprehensive, proven line of data connectivity components available anywhere. Developers worldwide at more than 250 leading independent software vendors and thousands of corporate IT departments rely on DataDirect® products to connect their applications to an unparalleled range of data sources using standards-based interfaces such as ODBC, JDBC™ and ADO.NET. Developers also depend on DataDirect to radically simplify complex data integration projects using XML products based on the emerging XQuery and XQJ standards. DataDirect Technologies is an operating company of Progress Software Corporation (Nasdaq: PRGS), a US$300+ million global software industry leader. Headquartered in Bedford, Mass., DataDirect Technologies can be reached on the Web at http://www.datadirect.com or by phone at +1-800-876-3101.

6 OF 6

D A T A D I R E C T

T E C H N O L O G I E S

OCTOBER 2005

Similar Documents

Premium Essay

Sql Server Authentication

...SQL server authentication (1) SQL server recognizes two different types of authentication: Windows Authentication and SQL Server Authentication. Using Windows Authentication allows users to provide some kind of credentials associated with the windows user accounts built into the domain of your server if it is a windows based system. Using windows authentication provides a more secure environment and is considered integrated security. Each user has a domain log in or account name that is used for windows and then re-used for SQL authentication. The second method of authorization is simply SQL server authentication. This is typically used when there is no access to an active windows domain or an account does not exist for that user to authenticate through windows. You can use what is called a mixed mode authorization and use a combination of both windows and SQL authentication. However, this opens more access points to your database server and therefore less secure and not recommended. Using windows authentication is more secure because it allows for authentication at a domain level and can be managed more easily through active directory accounts and groups. http://sqlchicken.com/2009/09/sql-university-basic-tools/ (2) Microsoft Access has several authorization options. These include role-based, identity-based, and resource-based options. Role-based authorization is secured based on the role of the user. All users that fit in the same role will...

Words: 304 - Pages: 2

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Premium Essay

Work Floe Installation

...2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Notwithstanding the foregoing, the licensee of the software with which this document was provided may make a reasonable number of copies of this document solely for internal use. Trademarks Microsoft, Microsoft Dynamics, Internet Explorer, Outlook, SharePoint, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation or its affiliates in the United States and/or other countries. The names of actual companies and products mentioned herein may be trademarks or registered marks - in the United States and/or other countries - of their respective owners. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Intellectual property Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 12176 - Pages: 49

Free Essay

Web Services

...What is an HTTP Endpoint in Sql Server?  Well, it is a way to create a usable interface using HTTP or TCP for SOAP, T-Sql, Service Brokering and a few other things.  I’m just going to tell you, quick and simple, about creating a web service to return data, although you can return scalar values, messages and errors too.  The results returned are serialized into Xml.  If you have Windows 2003, you don’t have to have IIS installed.  Sql server will use the http.sys module in the Win2K3 kernel. So lets look at creating a usable web service from within Sql Server.  Lets start with creating a stored procedure. Create stored procedure to return list of employees use adventureworks go create procedure dbo.GetEmployees As select e.employeeid, e.title, c.FirstName + ‘ ‘ + c.Lastname As Fullname from HumanResources.employee e inner join person.contact c on e.contactid = c.contactid go Now, lets create our sql server web service, known as an HTTP ENDPOINT. The Sql 2005 code to create the HTTP ENDPOINT use adventureworks go CREATE ENDPOINT GetEmployees     STATE = STARTED AS HTTP (     PATH = ‘/Employee’,     AUTHENTICATION = (INTEGRATED),     PORTS = (CLEAR),     SITE = ‘localhost’ ) FOR SOAP (     WEBMETHOD ‘EmployeeList’         (NAME=’AdventureWorks.dbo.GetEmployees’),     BATCHES = DISABLED,     WSDL = DEFAULT,     DATABASE = ‘AdventureWorks’,     NAMESPACE = ‘http://AdventureWorks/Employee’ ) go There we go.  We now have a web service!  You access...

Words: 707 - Pages: 3

Premium Essay

Comparison Capabilities

...regards to common use of databases is concerned, they offer capacity in creating queries, definitions, updates and management of and within databases. The integral programs are additionally in control of arranging information that may possibly hold procedures regarding data entry, authentication, storing data, and recovery. Concerning Microsoft SQL Server in addition to Oracle it may well be undoubtedly identified that it’s possible for Microsoft SQL Server to serve as industry leader as well as being favored by a high percentage of companies/businesses in regards to each ones individual database requirements. One major difference between companies selecting either Microsoft SQL Server or Oracle for their database requirements is the cost; Oracle is substantially higher. Businesses must search for skilled individuals in order to manage an Oracle database; this equates to these individuals requiring a much higher salary, except when it comes to Microsoft SQL Server; this individual is not required to have strong skills during the start-up. The learning curve in Oracle is a little more complex than it is in Microsoft SQL Server. As concerns execution goes, the operation of Microsoft SQL Server is sufficient for roughly 200 GB, whereas Oracle is able to achieve much higher level of operation. If data volume...

Words: 545 - Pages: 3

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Premium Essay

Chapter 2

...both can keep and store the data or records. They both have a database that will be kept the information. And it’s difference in the implementation. The system that they developed was implemented through touch screen devices. The Integrated Human Resources Information System with Biometric Technology of the City Government of Tanauan is concern on how they can store, update, and retrieve files in the shortest possible time and to well-organized the reports of the Human Resource Department Office of the City Government of Tanauan. They developed the system in Microsoft Visual Basic 2008 and MS SQL Server 2008. (Barba et.al, March, 2010) The study conducted by Barba et.al is similar with developed system because they can store, update, and retrieve information. And the database that they used in the system is same with the database used by the proponents, the SQL Server 2008. This will holds all the information that of the system. The both system is concern on how to process the information in shortest possible time. Technical Background In order for the proponents to develop the system, they used the following hardware and software. (Avoid...

Words: 870 - Pages: 4

Premium Essay

Its410 Portfolio

...is my recommendation that the company move to a more secure, robust, centralized database server company wide. The database system recommended is Microsoft SQL Server 2005 for its ability to be a central database to handle, customer information, widget inventory, company payroll, and other sensitive data. Our current process requires users to open separate databases to retrieve information or call other users to obtain information out of another database. This current setup is not only inefficient it is also not secure and provides not backup for disaster recovery. I have created a comprehensive plan that will outline all of the requirements for upgrading our systems to Microsoft SQL Server 2005. The following will be addressed: * Installation requirements for SQL Server 2005 * Databases being used * Data types needed * Database Objects * Mail * Security * Database Protection * Availability * Maintenance and monitoring The first step in transitioning over to a Microsoft SQL Server 2005 system will be to prepare our server systems and make sure they meet the minimum requirements for installing. The minimum requirements for Microsoft SQL Server 2005 are listed below: Hardware and Software Requirements (32-Bit and 64-Bit) * Pentium III Processor 600mhz or faster * 512mb of ram, 1gb of ram is recommended * Monitor * SQL Server graphical tools require VGA or higher resolution: at least 1,024x768 pixel resolution. ...

Words: 4256 - Pages: 18

Free Essay

Biometrics

...Biometrics Presented by Ratna Sudha.R CONTENTS 1. Introduction 2. Security and authentication 3. Methods of verification a. Psychological verification i. Finger Print. ii. Hand Print. iii. Face Measurement. iv. Retinal Scanning. v. DNA Analysis. b. Behavioral verification i. Typing. ii. Signature. iii. Voice. 4. Identification. 5. Verification. 6. Advantages 7. Limitations 8. Conclusion. 9. References Introduction Biometrics is an advanced technology for superb security and authentication .The very term "biometric” it represent that "bio" means related to the biological study and "metric " means something, which is related to measurement. In network environment security is a crucial factor. Provide security to pages in the network is to difficulty. Password is not a good measurement for security. Good security mechanism is necessary on the Internet. Security in different levels applies to various documents. Security is depends how security assign to documents. Security depends on following categories. 1. Confidential 2. Secret 3. Non-secret 4. Public Confidential pages over the network provide full security...

Words: 1911 - Pages: 8

Free Essay

Sharepoint 2010 Installation and Configuration Plan

...SHAREPOINT 2010 AND FAST SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of...

Words: 7699 - Pages: 31

Premium Essay

Coop Experiance

...assignments, task, projects and achievements that I am involved in during my coop period at Rashed Abdul Rahman Al-Rashed & Sons Company at HRIS department from the first to the eighth week. Here is the list of topics that I will be discussing in this report: 1- SQL Server 2- OFOQ ERP System (Time Management) 3- Project SQL Server From the first day of my coop, my supervisor gave me an SQL database and a Microsoft SQL course CD to practice SQL. It took me a week to refresh and to get back on the right path. Moreover, he also gave me a documentation that has all of the information about the joins between the tables, so I can fully understand how to generate meaningful reports to the management. The next two weeks were about maintaining the database and how to perform a periodical database backup as figure 1 illustrates. Figure [ 1 ] SQL Backup Job OFOQ Human Resource System (Time Management) The company have two ways to record the employee’s attendance. First, by using the gates that are near the elevators. Second, by using the finger scanner. Both ways have two distinct servers to record the attendance. I was fortunate enough to take charge of extracting the log files of attendance from both servers and then upload them to the HR system as a daily task Figure2. Sometimes, the employees forget to login in or logout and the system does not know how to fix this conflict, because for every login there have to be a logout. I am able to resolve this conflict because...

Words: 987 - Pages: 4

Premium Essay

Sharepoint Upgrade

...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...

Words: 74170 - Pages: 297

Free Essay

Amit Kumar

...HOMEWORK CAP613T: DATABASE ADMINISTRATION Q1. Profiles and accounts are managed in SQL Server 2008 using various stored procedures. Create profile and its accounts and manage them using those stored procedures and give the screen shots with results. Ans. sysmail_add_profile_sp [pic] sysmail_add_account_sp [pic] sysmail_add_profileaccount_sp [pic] sysmail_update_profile_sp [pic] sysmail_update_account_sp [pic] sysmail_update_profileaccount_sp [pic] Q2.  Create Event Notification for updation and deletion of table. Ans. Creating Event Notification for updation: CREATE EVENT NOTIFICATION NotifyUpdateEvents ON DATABASE FOR UPDATE_TABLE TO SERVICE '//AdventureWorks/EventNotificationService' , 'current database' GO Creating Event Notification for deletion: CREATE EVENT NOTIFICATION NotifyDeleteEvents ON DATABASE FOR DELETE_TABLE TO SERVICE '//AdventureWorks/EventNotificationService' , 'current database' GO Q3 “A common configuration is to use the same account for both SQL Server Service and SQL Server Agent Service” comment. Are there some extra conditions or rights in windows operating system for the accounts used by SQL Server Agent, if yes. Discuss them? Ans. • Adjust memory quotas for a process: This privilege determines who can change the maximum memory that can be consumed by a process. This privilege is useful for system tuning, but it can be misused, for example, in a denial-of-service...

Words: 876 - Pages: 4

Premium Essay

Security

...SECURITY WEAKNESSES FOR QUALITY WEB DESIGN INTRODUCTION 3 ABSTRACT 3 COMPANY BACKGROUND 3 SOFTWARE WEAKNESSES 4 EMAIL SERVER WEAKNESSES 4 SOLUTION 4 DATABASE WEAKNESS 5 SOLUTION 5 HARDWARE RELATED WEAKNESSES 6 HARDWARE WEAKNESSES 6 SOLUTION 6 HARDWARE POLICY WEAKNESSES 6 SOLUTION 7 REFERENCES: 8 INTRODUCTION A company that deals with making web site and web business solutions is known as Quality Web Design (QWD). The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting, payroll marketing, also parts of the business process and for which it assets are employed. ABSTRACT QWD provides business solutions via Internet to its customers. The circuit used by the company may prove various flaws to security and the hardware and software used have various limitations as Microsoft share point which have limitations in supporting virtualization, upgrade whereas the web server provided by IBM provides various functionalities over the Microsoft web server. The company has a very good hardware, software, network system, the assets used by the company provide the support to the business process but there are many limitations of the hardware, software, assets and the network design. They provide the support to the companies by providing web solutions so that they can spread their business through internet. The company processes also include...

Words: 1442 - Pages: 6

Premium Essay

Security Project

...SECURITY WEAKNESSES FOR QUALITY WEB DESIGN Contents Course........................................................................................................ Error! Bookmark not defined. Introduction ............................................................................................................................................ 3 Abstract .................................................................................................................................................. 4 Company Background.............................................................................................................................. 4 Software Weaknesses and Recommendations......................................................................................... 5 Hardware Weaknesses and Recommendations........................................................................................ 6 Network Security flaws and Recommendations ....................................................................................... 7 REFERENCES:........................................................................................................................................... 7 Introduction A company that deals with making web site and web business solutions is known as Quality web design. The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting...

Words: 1406 - Pages: 6