Please start any new threads on our new site at https://forums.sqlteam.com. We've got lots of great SQL Server experts to answer whatever question you can come up with.

 All Forums
 SQL Server 2000 Forums
 SQL Server Development (2000)
 Integrated Security and Rogue Applications

Author  Topic 

AskSQLTeam
Ask SQLTeam Question

0 Posts

Posted - 2004-09-16 : 08:24:02
David writes "Hello:

There is lots of encouragement there for the use of Integrated (Windows) authorization, and I'd like go down that road, to avoid using stored credentials and to simplify administration of users and groups.

However, the one thing that holds me back is the ability of users to execute rougue applications (such as Query Analyzer). I realize it is possible for a proc to test the calling applications name, but that can be faked easily. Checking IP addresses also seems to be a limited and ugly solution. Is there another path I should consider?


THanks much,

David"

robvolk
Most Valuable Yak

15732 Posts

Posted - 2004-09-16 : 08:27:04
You can minimize the damage a rougue user can do by denying direct access to tables. Allow data access only through stored procedures or views, and only allow updates/deletes/inserts through stored procedures. It's a bit of work, but it keeps sneaky people from working with data in ways you don't want.

I'd also suggest talking to your network admins about user profiles in Windows. They can exert a lot of control over what can and can't be installed on a computer by an end user.
Go to Top of Page
   

- Advertisement -