Skip to content

Commit 59adedf

Browse files
authored
Update sql-database-security-best-practice.md
Changes based on action items.
1 parent 241b57e commit 59adedf

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/sql-database/sql-database-security-best-practice.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,9 @@ Authentication is the process of proving the user is who they claim to be. Azure
6464
- SQL authentication
6565
- Azure Active Directory authentication
6666

67+
> [!NOTE]
68+
> Azure Active Directory authentication may not be supported for all tools and 3rd party applications.
69+
6770
### Central management for identities
6871

6972
Central identity management offers the following benefits:
@@ -261,7 +264,7 @@ The following best practices are optional but will result in better manageabilit
261264
- It is a best practice to use schemas to grant permissions inside a database. (also see: [Schema-design for SQL Server: recommendations for Schema design with security in mind](http://andreas-wolter.com/en/schema-design-for-sql-server-recommendations-for-schema-design-with-security-in-mind/))
262265
- Object (table, view, procedure, etc.)
263266
> [!NOTE]
264-
> It is not recommended to apply permissions on the object level because this level adds unnecessary complexity to the overall implementation. If you decide to use object-level permissions, those should be clearly documented. The same applies to column-level-permissions, which are even less recommendable for the same reasons. Also be aware that by default a table-level [DENY](https://docs.microsoft.com/sql/t-sql/statements/deny-object-permissions-transact-sql) does not override a column-level GRANT. This would require the common criteria compliance Server Configuration to be activated.
267+
> It is not recommended to apply permissions on the object level because this level adds unnecessary complexity to the overall implementation. If you decide to use object-level permissions, those should be clearly documented. The same applies to column-level-permissions, which are even less recommendable for the same reasons. Also be aware that by default a table-level [DENY](https://docs.microsoft.com/sql/t-sql/statements/deny-object-permissions-transact-sql) does not override a column-level GRANT. This would require the [common criteria compliance Server Configuration](https://docs.microsoft.com/sql/database-engine/configure-windows/common-criteria-compliance-enabled-server-configuration-option) to be activated.
265268
266269
- Perform regular checks using [Vulnerability Assessment (VA)](https://docs.microsoft.com/sql/relational-databases/security/sql-vulnerability-assessment) to test for too many permissions.
267270

0 commit comments

Comments
 (0)