Download How to Take Advantage of Contained Databases in SQL Server 2012

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
How to Take Advantage of
Contained Databases in SQL
Server 2012
Steve Jones
SQLServerCentral
Red Gate Software
Agenda
• What is a contained database?
• Contained Databases in SQL Server 2012
• Looking Forward
Databases in SQL Server
tables,
views
procedures
usersDB1
Instance
tables,
views
procedures
usersDB1
tables,
views
procedures
usersDB1
Other RDBMS Platforms
tables,
views
procedures
usersDB1
Instance
tables,
views
procedures
usersDB1
Instance
tables,
views
procedures
usersDB1
Instance
Databases in SQL Server
Packages/Plans
Logins
Instance
Linked Servers
tables,
views
procedures
User
usersDB1
tables,
views
procedures
usersDB1
Jobs
Contained Databases
• Databases in SQL Server
Packages
Logins
tables,
views
procedures
DB1
Jobs
Linked Servers
tables,
views
procedures
DB1
Moving Databases
• When do we move database?
–
–
–
–
–
Testing
DR
Hardware upgrades
Scalability
Azure
Virtualization
• Moving VMs
Azure
Contained Database
• A contained database is a concept in which a
database includes all the settings and metadata
required to define the database and has no
configuration dependencies on the instance of
the SQL Server Database Engine where the
database is installed.
From Partially Contained Databases
Terms
•
•
•
•
•
Application Boundary (Database Boundary)
Contained
Uncontained
Application Model (Database Model)
Management Model
SQL Server 2012
• Partially contained databases
– Users authenticate inside the database
– Collation resolution
– Can include non-contained objects
– No replication
– No Change Tracking
– No CDC
– No file activity (Filestream/FileTable)
– Various other restrictions (see BOL)
SQL Server 2012
• Create CDB Demo
Security
• User with password
– Authentication Type = 2
– Password complexity rules apply on create/alter
• Windows Principal
– No login in master
Security
Contained Databases
• Security Demo
– Users
– certficates
Migration
• set partial containment
• migrate users
Collation
• Collation conflicts between a user database
and tempdb are handled
• Collation set when the batch begins
• Collation Demo
Partial Containment Issues
• sys.dm_db_uncontained_entities – DMV to
find objects that are not contained.
• Cdb_uncontained_usage Event – Xevent fired
when an uncontained entity is used. (run-time)
• Collation – determined at batch start time. Can
cause issues if you have USE statements.
• Duplicate logins
• RAISERROR/THROW
Containment Security Issues
• ALTER ANY USER (db_owner or
db_securityadmin) users can create users
without the server admin’s knowledge
• Guest accounts break containment. Contained
users can exploit this.
• Sysadmin – never use initial catalog, always
use server level authentication.
Containment Security Issues
• Dbcreator role – Can change containment
status (possible users created without
knowledge)
• Attaching databases does not check user
passwords.
• Passwords stored in the CDB (dictionary
attack issues)
The Future
• What might be coming
– Linked servers
– Service Broker
– Maintenance Plans
– Jobs
–?
The End
•
•
•
•
•
•
Questions?
Don’t forget to fill out your evaluations
Resources at the end of the PPT
www.sqlservercentral.com/forums
www.voiceofthedba.com/talks/
Enjoy DevConnections
References
•
•
•
•
•
•
•
Partially Contained Databases - http://technet.microsoft.com/enus/library/ff929071%28v=SQL.110%29.aspx
Threats Against Contained Databases - http://msdn.microsoft.com/enus/library/ff929055%28v=sql.110%29.aspx
sys.dm_db_uncontained_entities
Contained Databases overview http://sqlblog.com/blogs/aaron_bertrand/archive/2010/11/16/sql-server-v-nextdenali-contained-databases.aspx
Database Shuffle - http://blogs.msdn.com/b/isaac/archive/2011/04/20/the-databaseshuffle.aspx
Collation Hell -http://blogs.msdn.com/b/isaac/archive/2011/05/05/collationhell.aspx
Features within the Application Model - http://msdn.microsoft.com/enus/library/ff929188%28v=SQL.110%29.aspx
References
•
•
•
•
•
•
Features Outside of the Application Model - http://msdn.microsoft.com/enus/library/ff929118(v=sql.110).aspx
http://blogs.msdn.com/b/sqlsecurity/archive/2010/12/03/contained-databaseauthentication-introduction.aspx
http://blogs.msdn.com/b/sqlsecurity/archive/2010/12/08/contained-databaseauthentication-in-depth.aspx
http://blogs.msdn.com/b/sqlsecurity/archive/2010/12/04/contained-databaseauthentication-monitoring-and-controlling-contained-users.aspx
http://blogs.msdn.com/b/sqlsecurity/archive/2010/12/06/contained-databaseauthentication-how-to-control-which-databases-are-allowed-to-authenticate-usersusing-logon-triggers.aspx
Azure - http://social.technet.microsoft.com/wiki/cfsfile.ashx/__key/communityserver-wikis-components-files/00-00-00-0005/2671.figure1.jpg
Images
•
•
•
•
Sword - http://www.flickr.com/photos/[email protected]/2639252064/
Knife - http://www.flickr.com/photos/marxfoods/3555089558/
Login Logic - http://blogs.msdn.com/resizedimage.ashx/__size/550x0/__key/CommunityServer-Blogs-ComponentsWeblogFiles/00-00-00-92-93/8130.alg.jpg
vMotion - http://www.atlantavdi.com/wp-content/uploads/2010/10/vmotion1.gif
Related documents