Question

If you expand the “Security” folder on your SQL Server instance, you will see a “Login”...

If you expand the “Security” folder on your SQL Server instance, you will see a “Login” folder. If you expand the “Security” folder on a database, you will see a “User” folder. What is the difference between a login and a user? Provide an example of a login and a user. Can a user exist without a login? Assertions need support with sufficient evidence.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

here in the sql server user and login are different

logins are for authentication purpose and user are for authorization purpose i.e., login is authenticate whether he valid one or not and and users are used to give authorization to particular database

logins are created at server instance and users are created at database level.

suppose if you are new to project and you are going to be an sql developer. so sql admin will create a authentication for you to enter to the sqlserver called login. so when you enter with your credentials you will able to see all the databases in it. so when you try to open the database it will send error because you are not authorized to use that database.so if you have to work on the database for example xyz. then by right clicking on the database admin will create a db user and assign that user to the login associated with it. base on the permission of the user you can access different levels on the database.

i.e, if you don't have a permission on a particular table that table won't be accessed by you login. and a login can be mapped with different users(n database n users will be possible).

Users which are not associated with Logins will be called as Orphan ID's. You can either delete it from database level or you can create a login in SQL and map the orphan ID with the newly created ID.

This situation will araise when you restore a database from different server (i.e from server1 to server2) where server1 will the logins associated with the db user and when you restore in server2 these logins might not exist in server2 and hence it will be an orphan ID in server2 db.

if you have any doubt please comment below

Add a comment
Know the answer?
Add Answer to:
If you expand the “Security” folder on your SQL Server instance, you will see a “Login”...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For this hands-on project, you will use the SQL Server named instance SQLSERVERHOA, and the HandsOnOne...

    For this hands-on project, you will use the SQL Server named instance SQLSERVERHOA, and the HandsOnOne database and tables you created in previous chapters. The objective of this activity is to practice generating keys and encrypting/decrypting data. Document each step by taking a screen shot of the Query Editor window after successfully executing each SQL query. 1.In SQL Server Management Studio, open a new Query Editor window, which you will use for completing all steps in this activity. 2.Create a...

  • Hi I need some help writing a security code using python mongodb restful api. I just...

    Hi I need some help writing a security code using python mongodb restful api. I just need help on how to provide a security login to user to enter their username and password or to have a block in using extra access once they have logined and they want more access to the databases they will be force to sign out of the server but I just do not know how to start on it can someone show me how...

  • help! Due: 10/31/17 Submit under: Assignmen8 folder (only) Chapter-10: Apache Web Server Explain that a web...

    help! Due: 10/31/17 Submit under: Assignmen8 folder (only) Chapter-10: Apache Web Server Explain that a web server is a network computer with the primary role of serving Web pages to clients on request. 1、 2. Explain that the HTTP-Server is a YaST module for configuring Apache. The package name is yast2-http-server, and it can be installed from YaST Software Management. Discuss the following default settings for a Web server in Apache: " DocumentRoot . Alias . ScriptAlias . Include ....

  • Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has...

    Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has the following equipment: 5 Servers in San Francisco, LA and Sacramento, all deploying Windows Server 2102R2 as follows: 1 SQL Server Database server in SFO 1 Exchange Email Server in SFO 1 File Server in SFO. This server is also the Domain Controller 1 File Server in Sacramento 1 File Server in L.A The file servers are connected through VPN lines to each other....

  • You need to create your own connection string. So you need to know what each of...

    You need to create your own connection string. So you need to know what each of the parts of the connection string mean. The connection string needs to know the location where the SQL Server resides, and that's usually a domain name or IP address. This may vary! Then you need to know who you are talking to, and that is the name of the server. This is the initial catalog. The AttachDbFilename shows the name of the file and...

  • research the following: Data modeling Benefits of SQL for application processing Based on your research and...

    research the following: Data modeling Benefits of SQL for application processing Based on your research and understanding, complete the following discussions: Discuss the benefits of views. Examine how views can affect database usability by considering both positive and negative aspects. Provide examples from business cases to support your response. Evaluate and discuss the given comment: "The database is slow and does not provide the data I need. Using this system makes my job harder." Based on your evaluation, answer the...

  • Scenario: In your newly assigned Oracle DBA position, the security audit team wants you to be...

    Scenario: In your newly assigned Oracle DBA position, the security audit team wants you to be involved in a new project to make sure Users are created with Least Privileges, the database uses encryption for all data-at-rest, use separate table spaces for users and applications, user passwords expire on first login, quotas should be used for tablespaces as opposed to unlimited tablespaces, temporary tablespaces should be used to help speed performance, no default user passwords exist in the database, Roles...

  • Your hypothetical employer, X University, is pleased with feedback you offered on suggestions about potential types...

    Your hypothetical employer, X University, is pleased with feedback you offered on suggestions about potential types of databases and is also please with your suggestions on various Systems Development Life Cycle methodologies. This would be a relational database model for a payroll system that will be standalone but will need to have ability to communicate with other ODBC and SQL Server databases. The overall purpose of the database will be to input employee data for 100-150 employees. The database will...

  • Chapter 2 How to use the Management Studio Before you start the exercises... Before you start...

    Chapter 2 How to use the Management Studio Before you start the exercises... Before you start these exercises, you need to install SQL Server and the SQL Server Management Studio. The procedures for doing both of these tasks are provided in appendix A of the book. In addition, you'll need to get the Exercise Starts directory from your instructor. This directory contains some script files that you need to do these exercises. Exercises In these exercises, you'll use SQL Server...

  • Helpp: Make an application Protocol Application log for text messages In this task, an application protocol for sending...

    Helpp: Make an application Protocol Application log for text messages In this task, an application protocol for sending and retrieving text messages is to be developed. A client (eg app on a smartphone) communicates with an application on a web server running a database of user data (username and password) and messages (user name of the sender, user name of the recipient, message text). The client should be able to perform the following actions: Register a new user Log in...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT