InterviewSolution
| 1. |
What Are The New Security Features Added In Sql Server 2012? |
|
Answer» Default Schema for Windows Group Logins: Let’s say we have a Windows account [MyDomain WinAdmin]. If someone from this group logged in [MyDomainUser1] and tried to create an object then there will be a new schema created like [MyDomainUser1].Table. This issue got FIXED in 2012. In 2012 we can assign a default schema for the Windows Group accounts. User Defined Server ROLES: Till 2008 R2 we have user defined roles at database level, 2012 allows us to create a Server level user defined roles which gives us more control in handling security. Contained Database: Easier database migrations as it contains user and login information on same database instead of in Master. Data Protection: Supporting Hash Algorithm-256 (SHA-256) and SHA-512. Auditing: Native support/feature for auditing the database environment by creating the Audit specifications. We can also create user defined audits. Ex: We can create an Audit specification to TRACE all events for a SPECIFIC login and write all these event details into Audit Log. We can also filter the events. Default Schema for Windows Group Logins: Let’s say we have a Windows account [MyDomain WinAdmin]. If someone from this group logged in [MyDomainUser1] and tried to create an object then there will be a new schema created like [MyDomainUser1].Table. This issue got fixed in 2012. In 2012 we can assign a default schema for the Windows Group accounts. User Defined Server Roles: Till 2008 R2 we have user defined roles at database level, 2012 allows us to create a Server level user defined roles which gives us more control in handling security. Contained Database: Easier database migrations as it contains user and login information on same database instead of in Master. Data Protection: Supporting Hash Algorithm-256 (SHA-256) and SHA-512. Auditing: Native support/feature for auditing the database environment by creating the Audit specifications. We can also create user defined audits. Ex: We can create an Audit specification to trace all events for a specific login and write all these event details into Audit Log. We can also filter the events. |
|