title | description | author | ms.author | ms.date | ms.service | ms.subservice | ms.topic | ms.custom | f1_keywords | helpviewer_keywords | monikerRange | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Securables |
Learn about the securable scopes, which the SQL Server Database Engine authorization system uses to regulate access to securables. |
VanMSFT |
vanto |
11/05/2024 |
sql |
security |
conceptual |
|
|
|
>=aps-pdw-2016 || =azuresqldb-current || =azure-sqldw-latest || >=sql-server-2016 || >=sql-server-linux-2017 || =azuresqldb-mi-current || =fabric |
[!INCLUDE SQL Server Azure SQL Database Synapse Analytics PDW FabricSQLDB]
Securables are the resources to which the [!INCLUDEssDEnoversion] authorization system regulates access. For example, a table is a securable. Some securables can be contained within others, creating nested hierarchies called "scopes" that can themselves be secured. The securable scopes are server, database, and schema.
The server securable scope contains the following securables:
-
Availability group
-
Endpoint
-
Login
-
Server role
-
Database
The database securable scope contains the following securables:
-
Application role
-
Assembly
-
Asymmetric key
-
Certificate
-
Contract
-
Fulltext catalog
-
Fulltext stoplist
-
Message type
-
Remote Service Binding
-
(Database) Role
-
Route
-
Schema
-
Search property list
-
Service
-
Symmetric key
-
User
The schema securable scope contains the following securables:
-
Type
-
XML schema collection
-
Object - The object class has the following members:
-
Aggregate
-
Function
-
Procedure
-
Queue
-
Synonym
-
Table
-
View
-
External Table
-
The entity that receives permission to a securable is called a principal. The most common principals are logins and database users. Access to securables is controlled by granting or denying permissions, or by adding logins and users to roles which have access. For information about controlling permissions, see GRANT (Transact-SQL), REVOKE (Transact-SQL), DENY (Transact-SQL), sp_addrolemember (Transact-SQL), and sp_droprolemember (Transact-SQL).
Caution
The default permissions that are granted to system objects at the time of setup are carefully evaluated against possible threats and need not be altered as part of hardening the [!INCLUDEssNoVersion] installation. Any changes to the permissions on the system objects could limit or break the functionality and could potentially leave your [!INCLUDEssNoVersion] installation in an unsupported state.
- In [!INCLUDE fabric-sqldb], only database-level users and roles are supported. Server-level logins, roles, and the sa account are not available. For more information, see Authorization in SQL database in Microsoft Fabric.