Quantcast
Channel: The Insiders: Journeys in SQL - metadata
Viewing all articles
Browse latest Browse all 10

Database and Server Principal Metadata

$
0
0

So, let's have a look at principals. There are two levels of principals - those that participate in the database (users and roles) and those that have access to the server (logins). Let's look at the principals at the database level first, by looking at [sys].[database_principals]:

nameThis is the name of the database principal. This is the name that will be referenced for statements such as ALTER AUTHORIZATION.
principal_idThis is the ID of the principal, referenced by principal_id columns.
typeThis is a single character that determines the type of the principal:
  • S = SQL user
  • U = Windows user
  • G = Windows group
  • A = Application role
  • R = Server role
  • C = User mapped to a certificate
  • K = User mapped to an asymmetric key
type_descThis is the description that relates to the value in the type column.
default_schema_nameThis is the name of the default schema for the database principal. Note that a name is used rather than the ID, because otherwise there would be a circular dependency when creating principals and schemas with owners. Which came first, the chicken principal or the egg schema?
create_dateThis is the date on which the principal was created.
modify_dateThis is the date on which the principal was last modified.
owning_principal_idThis is the ID of the database principal that owns the current principal.
sidThis is the SID for SQL users, Windows users and Windows groups.
is_fixed_roleThis is 1 if the entry is one of the fixed database roles:
  • db_owner
  • db_accessadmin
  • db_datareader
  • db_datawriter
  • db_ddladmin
  • db_securityadmin
  • db_backupoperator
  • db_denydatareader
  • db_denydatawriter

We get a good bit of information there, enough to re-create the database user / role if necessary. Let's look at the principals at the server level, this time looking at [sys].[server_principals]:

nameThis is the name of the server principal - this will be referenced when creating a database user.
principal_idThe is the ID of the server principal within the server.
sidThis is the Security ID of the principal, which will be the same as the Windows SID for a Windows login / group.
typeThis is a single character that determines the type of the principal:
  • S = SQL login
  • U = Windows login
  • G = Windows group
  • R = Server role
  • C = Login mapped to a certificate
  • K = Login mapped to an asymmetric key
type_descThis is the description that relates to the value in the type column.
is_disabledThis is 1 if the login is disabled.
create_dateThis is the date on which the principal was created.
modify_dateThis is the date on which the principal was last modified.
default_database_nameThis is the name of the default database for this principal.
default_language_nameThis is the name of the default language for this principal.
credential_idThis is the ID of the credential, in [sys].[credentials] that relates to this principal, if applicable.

Now we have enough information to create both the user and login... almost. Note that passwords and other sensitive information are never available in metadata for security reasons (somewhat obviously). The other pertinent information that we want is the members of each role - for which we look to [sys].[database_role_members]:

role_principal_idThis is the ID of the database principal in [sys].[database_principals] that represents the role.
member_principal_idThis is the ID of the database principal in [sys].[database_principals] that represents the role member.

Excellent, just what we need, nothing more, nothing less.

Next time, we'll take a look at the key and certificate based views.


Viewing all articles
Browse latest Browse all 10

Trending Articles