Tag Archives: Security

70-451 – Designing a Database Solution – Application Security

Requirements Design an application strategy to support security.This objective may include but is not limited to: application roles, schema ownership, execution context, Windows vs. SQL authentication, permissions and database roles My Take We need to understand the implications of how … Continue reading

Posted in SQL | Tagged , , | 2 Comments