views:

1734

answers:

9

Is there a way to prevent users from getting into SQL Server Management Studio so that they can't just edit table rows manually? They still need to access the tables by running my application.

+4  A: 

I would suggest you lock down the database and give appropriate read-only (or other) rights to the user. That way the user can still use management studio to run select queries and such.

If you don't want the user to have any rights at all then you could do that as well.

Jon Erickson
+1  A: 

If your application only used stored procedures to modify the data, you could give the end users access to run the stored procs, but deny them access to modify the tables.

David
+1  A: 
  • Don't let them know what the database login is.
  • If you can't restrict the login, use stored procedures exclusively for updates and disable any CREATE,DELETE,INSERT, or UPDATE permissions for that user.
Joel Coehoorn
A: 

An Application Role will allow you to secure database objects to your application instead of the logged on user.

Martin Brown
+5  A: 

You DO NOT need to worry about them having access to the tool. Simply make sure they do not know any of the SQL logins for the specific Databases that have read/write permissions, if they do, change the password. If they have access to the DB via Windows Authentication, make sure that they are in a datareader role. You can use roles to manage what the users can do in SQL.

RSolberg
A: 

I agree with Jon Erickson as a general rule

  • do not allow any users access to the tables, but only allow access through stored procs
  • do not allow general user accounts access to stored procs, but only the account your app runs under (whether it's an integrated login or SQL login)
Jesse C. Slicer
A: 

Make well usage of Database Roles, if Users should only have SELECT (read) access assign them the db_datareader Role. Even if they login using SSMS they will can execute only SELECT statements.

john84
+2  A: 

You can use the DENY VIEW ANY DATABASE command for the particular user(s). This is a new feature available in SQL Server 2008.

It prevents the user from seeing the system catalog (sys.databases, sys.sysdatabases, etc.) and therefore makes the DB invisible to them in SQL Management Studio (SSMS).

Run this command from the Master Database:

DENY VIEW ANY DATABASE TO 'loginName'

The user is still able to access the database through your application. However, if they log in through SSMS, your database will not show up in the list of databases and if they open a query window, your database will not appear in the dropdown.

However, this is not fool-proof. If the user is smart enough to run the Query Command:

USE <YourDatabaseName>

Then they will see the database in the Query Analyzer.

Since this solution is taking you 90% there, I would give the database some obscure name not let the users know the name of the database.

Jose Basilio
If you want to DOWNVOTE, that's fine, but be mature and courteous enough to leave a comment as to why you think I am wrong.
Jose Basilio
It doesn't say they need to have *read-only* access through their application, it says He doesn't want them to be able to manually edit the tables through SSMS
Jose Basilio
+1  A: 

If your application is running as a service/user account then only that account requires access to the database. The individual users' account do not require any access to the database and therefore they won't even have read access. Your app will be the gateway to the data.

If the users are running the application under their user accounts then grant them read-only permission. You can simply add them to the db_datareader role.

Hope this helps!

Keplerf1