Chapter1SecuringYourServerandNetwork(13):配置端点安全性
原文出处:http://blog.csdn.net/dba_huangzj/article/details/38489765,专题目录:http://blog.csdn.net/dba_huangzj/article/details/37906349 未经作者同意,任何人不得以原创形式发布,也不得已用于商业用途,本人不负责任何法律责任。 前一篇:http://b
原文出处:http://blog.csdn.net/dba_huangzj/article/details/38489765,专题目录:http://blog.csdn.net/dba_huangzj/article/details/37906349未经作者同意,任何人不得以“原创”形式发布,也不得已用于商业用途,本人不负责任何法律责任。
前一篇:http://blog.csdn.net/dba_huangzj/article/details/38438363
前言:
SQL Server端点(Endpoint)是出入SQL Server的门户,通过端点,任何东西可以在网络和SQL Server之间传输。端点可以是系统或者用户自定义的,其中系统端点允许使用T-SQL连接SQL Server并发送查询。
端点使用特定的协议定义,可以是HTTP或者TCP,从SQL Server 2012开始HTTP端点被移除出内置的Web Services功能中,仅能使用TCP端点。
通常使用自定义端点的目的有:
TCP 请求。本文介绍这种,可以用于建立专用或安全的SQL Server连接。 Service Broker 数据库镜像实现:
1. 在查询窗口中输入下面语句:
CREATE ENDPOINT myTSQLEndpoint STATE = started AS TCP ( LISTENER_PORT = 8080, LISTENER_IP = (127.0.0.1) ) FOR TSQL ();
2. 执行后会收到消息如下,意味着所有通过默认T-SQL端点连接的登录都会失去所有权限,你需要使用下面语句授权:
GRANT CONNECT ON ENDPOINT::[TSQL Default TCP] to [public];
消息:
创建 TSQL 端点将导致撤销 'TSQL Default TCP' 端点上的所有 'Public' 连接权限。如果此端点上需要 'Public' 访问权限,请使用'GRANT CONNECT ON ENDPOINT::[TSQL Default TCP] to [public]'重新应用此权限。
3. 可以使用下面语句查询端点情况:
SELECT * FROM sys.tcp_endpoints;
4. 可以使用ALTER ENDPOINT命令启动或停止端点:
ALTER ENDPOINT [TSQL Default TCP] STATE = STOPPED;
原理:
当SQL Server 安装完毕是,会为每个网络协议创建对应的SQL Server系统端点。访问端点的权限是赋予给Public 服务器角色。每个SQL Server登录都具有Public角色权限,可以通过下面语句进行授权和回收:
REVOKE CONNECT ON ENDPOINT::[TSQL Default TCP] to [public]; GRANT CONNECT ON ENDPOINT::[TSQL Default TCP] to [a_specific_login];

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)
