Skip to content

Commit 91ddfbe

Browse files
Merge pull request #208682 from Stralle/patch-4
Added note to execute mentioned statements on master database.
2 parents 10f5647 + c158a66 commit 91ddfbe

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/synapse-analytics/sql/shared-databases-access-control.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ After executing the code script below, it will allow non-admin users to have ser
4646
GRANT SELECT ALL USER SECURABLES to [login@contoso.com];
4747
GO;
4848
```
49-
`CONNECT ANY DATABASE` permission will allow a user to access connection to any database, but it doesn't grant any permission in any database beyond connect. When `SELECT ALL USER SECURABLES` permission is granted, a login can view data from all schema-level objects, such as external tables and views (any schema except sys and INFORMATION_SCHEMA). This permission has effect in all databases that the user can connect to. Read more about [GRANT SERVER permissions](/sql/t-sql/statements/grant-server-permissions-transact-sql?view=sql-server-ver15#remarks&preserve-view=true).
49+
> [!NOTE]
50+
> These statements should be executed on master database, as these are all server-level permissions.
5051
5152
After creating a login and granting permissions, users can run queries on top of the synchronized external tables. This mitigation can also be applied to Azure AD security groups.
5253

0 commit comments

Comments
 (0)