Sie sind auf Seite 1von 1

NOTES:

• The CONTROL SERVER permission has all permissions on the instance of SQL Server.

Database Engine Permissions


• The CONTROL DATABASE permission has all permissions on the database.
Permission Syntax
• Permissions do not imply role memberships and role memberships do not grant permissions. (E.g. CONTROL SERVER does not imply membership in
Most permission statements have the format : the sysadmin fixed server role. Membership in the db_owner role does not grant the CONTROL DATABASE permission.) However, it is sometimes
AUTHORIZATION PERMISSION ON SECURABLE::NAME TO PRINCIPAL possible to impersonate between roles and equivalent permissions.

• AUTHORIZATION must be GRANT, REVOKE or DENY. • Granting any permission on a securable allows VIEW DEFINITION on that securable. It is an implied permissions and it cannot be revoked, but it can

• PERMISSION is listed in the charts below. be explicitly denied by using the DENY VIEW DEFINITION statement.

• ON SECURABLE::NAME is the server, server object, database, or database object and its name. Some permissions do not
require ON SECURABLE::NAME.
• PRINCIPAL is the login, user, or role which receives or loses the permission. Grant permissions to roles whenever possible.
Sample grant statement: GRANT UPDATE ON OBJECT::Production.Parts TO PartsTeam
Database Level Permissions
Denying a permission at any level, overrides a related grant.
Top Level Database Permissions Connect and Authentication – Database Permissions Certificate Permissions
To remove a previously granted permission, use REVOKE; not DENY.
CONTROL SERVER CONTROL ON DATABASE::<name> STATEMENTS: DROP DATABASE
CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON USER::<name> CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON CERTIFICATE::<name>
How to Read this Chart
• Most of the more granular permissions are included in more than one higher level scope permission. CREATE DATABASE ** STATEMENTS: CREATE DATABASE, RESTORE DATABASE ** NOTE: CREATE DATABASE is a database level permission
CREATE ANY DATABASE
So permissions can be inherited from more than one type of higher scope. that can only be granted in the master database.
ALTER ANY DATABASE ALTER ON DATABASE::<name>

• Black, green, and blue arrows and boxes point to subordinate permissions that are included in the scope of higher a level VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON USER::<name> VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON CERTIFICATE::<name>
permission. ALTER ANY APPLICATION ROLE
REFERENCES ON DATABASE::<name> REFERENCES ON CERTIFICATE::<name>
ALTER ANY ASSEMBLY CREATE ASSEMBLY
• Brown arrows and boxes indicate some of the statements that can use the permission. ALTER ANY ASYMMETRIC KEY CREATE ASYMMETRIC KEY ALTER ANY DATABASE ALTER ON DATABASE::<name> IMPERSONATE ON USER::<name>
STATEMENTS:
ALTER ON DATABASE::<name> TAKE OWNERSHIP ON CERTIFICATE::<name>
ALTER ANY DATABASE
EXECUTE AS
ALTER ANY CERTIFICATE CREATE CERTIFICATE

Server Level Permissions


ALTER ANY CONTRACT CREATE CONTRACT STATEMENTS:
ALTER ANY USER ALTER ON USER::<name> ALTER ANY CERTIFICATE ALTER ON CERTIFICATE::<name>
ALTER ANY SERVER AUDIT ALTER ANY DATABASE AUDIT CREATE DATABASE AUDIT SPECIFICATION
ALTER ANY DATABASE DDL TRIGGER CREATE/ALTER/DROP database triggers STATEMENTS: STATEMENTS:
ALTER ANY EVENT NOTIFICATION ALTER ANY DATABASE EVENT NOTIFICATION CREATE DATABASE DDL EVENT NOTIFICATION ALTER USER Note: ADD SIGNATURE requires ALTER CERTIFICATE
Top Level Server Permissions ALTER ANY DATASPACE PARTITION & PLAN GUIDE statements DROP USER CONTROL permission on the certificate,
DROP CERTIFICATE
and requires ALTER permission on the
ALTER ANY FULLTEXT CATALOG CREATE FULLTEXT CATALOG CONNECT ON DATABASE::<name> CREATE USER CREATE CERTIFICATE
object. CREATE CERTIFICATE
STATEMENTS: ALTER ANY MESSAGE TYPE CREATE MESSAGE TYPE
STATEMENTS:
CONTROL SERVER CREATE/ALTER/DROP server triggers ALTER ANY REMOTE SERVICE BINDING CREATE REMOTE SERVICE BINDING
CREATE/ALTER/DROP server triggers
ALTER ANY ROLE CREATE ROLE
ADMINISTER BULK OPERATIONS OPENROWSET(BULK….
OPENROWSET(BULK … ALTER ANY ROUTE CREATE ROUTE
NOTES:
ALTER ANY AVAILABILITY GROUP – See Availability Group Permissions ALTER ANY SCHEMA CREATE SCHEMA
• When contained databases are enabled, creating a database user
CREATE AVAILABILTY GROUP ALTER ANY SERVICE CREATE SERVICE
that authenticates at the database, grants CONNECT DATABASE Assembly Permissions
ALTER ANY CONNECTION KILL
KILL ALTER ANY SYMMETRIC KEY CREATE SYMMETRIC KEY
to that user, and it can access SQL Server without a login.
ALTER ANY CREDENTIAL CREATE/ALTER/DROP CREDENTIAL ALTER ANY USER – See Connect and Authentication – Database Permissions Chart CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON ASSEMBLY::<name>
• Granting ALTER ANY USER allows a principal to create a user
ALTER ANY DATABASE – See Database Permission Charts
based on a login, but does not grant the server level permission
CREATE ANY DATABASE – See Top Level Database Permissions CREATE AGGREGATE
to view information about logins.
ALTER ANY ENDPOINT – See Connect and Authentication CREATE DEFAULT
CREATE ENDPOINT – See Connect and Authentication CREATE FUNCTION
VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON ASSEMBLY::<name>
ALTER ANY EVENT NOTIFICATION Server scoped event notifications CREATE PROCEDURE
CREATE DDL EVENT NOTIFICATION Server scoped DDL event notifications CREATE QUEUE REFERENCES ON DATABASE::<name> REFERENCES ON ASSEMBLY::<name>
CREATE TRACE EVENT NOTIFICATION CREATE RULE
Database Role Permissions
Event notifications on trace events ALTER ON DATABASE::<name> TAKE OWNERSHIP ON ASSEMBLY::<name>
ALTER ANY DATABASE
ALTER ANY EVENT SESSION Extended event sessions CREATE SYNONYM
CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON ROLE::<name>
ALTER ANY LINKED SERVER sp_addlinkedserver CREATE TABLE
ALTER ANY LOGIN – See Connect and Authentication CREATE TYPE ALTER ANY ASSEMBLY ALTER ON ASSEMBLY::<name>
ALTER ANY SERVER AUDIT CREATE/ALTER/DROP SERVER AUDIT CREATE VIEW
and SERVER AUDIT SPECIFICATION STATEMENTS:
ALTER ANY SERVER ROLE – See Server Role Permissions CREATE XML SCHEMA COLLECTION
CREATE SERVER ROLE – See Server Role Permissions ALTER ASSEMBLY
VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON ROLE::<name>
Note: CREATE and ALTER ASSEMBLY
ALTER RESOURCES (Not used. Use diskadmin fixed server role instead.) DROP ASSEMBLY
statements sometimes require server
STATEMENTS: level EXTERNAL ACCESS ASSEMBLY CREATE ASSEMBLY CREATE ASSEMBLY
ALTER SERVER STATE DBCC
DBCC FREE…CACHE
FREE…CACHE and
and SQLPERF
SQLPERF
and UNSAFE ASSEMBLY permissions,
VIEW SERVER STATE Combined with TRUSTWORTHY allows delegation of authentication ALTER ANY DATABASE ALTER ON DATABASE::<name> TAKE OWNERSHIP ON ROLE::<name>
SELECT
SELECT on
on server-level
server-level DMV’s
DMV’s AUTHENTICATE SERVER AUTHENTICATE and can require membership in the
ALTER SETTINGS BACKUP DATABASE sysadmin fixed server role.
sp_configure,
sp_configure, RECONFIGURE
RECONFIGURE BACKUP DATABASE
ALTER TRACE sp_trace_create
sp_create_trace BACKUP LOG BACKUP LOG
ALTER ANY ROLE ALTER ON ROLE::<name>
AUTHENTICATE SERVER Allows
Allows server-level
server-level delegation
delegation CHECKPOINT CHECKPOINT
CONNECT SQL – See Connect and Authentication CONNECT REPLICATION CONNECT DATABASE STATEMENTS:
SHUTDOWN SHUTDOWN* DELETE ALTER ROLE <name> ADD MEMBER Service Broker Permissions
UNSAFE ASSEMBLY EXECUTE DROP ROLE
EXTERNAL ACCESS ASSEMBLY INSERT STATEMENTS: CREATE ROLE CREATE ROLE
NOTES: Only members of the db_owner CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON SERVICE::<name>
VIEW ANY DEFINITION REFERENCES Applies to subordinate objects in the database. See
fixed database role can add or remove
VIEW ANY DATABASE – See Database Permissions – Schema SELECT Database Permissions – Schema Objects chart.
members from fixed database roles.
UPDATE
VIEW ANY DEFINITION VIEW DEFINITION Notes:
* NOTE: The SHUTDOWN statement requires the SQL Server SHUTDOWN permission. Starting, stopping, and pausing the Database STATEMENTS: VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON SERVICE::<name>
TAKE OWNERSHIP • ALTER AUTHORIZATION for any object might also require IMPERSONATE or
Engine from SSCM, SSMS, or Windows requires Windows permissions, not SQL Server permissions. ALTER AUTHORIZATION SEND ON SERVICE::<name>
ALTER TRACE SHOWPLAN membership in a role or ALTER permission on a role.
TAKE OWNERSHIP ON SERVICE::<name>
SUBSCRIBE QUERY NOTIFICATIONS • ALTER AUTHORIZATION exists at many levels in the permission model but is never Application Role Permissions ALTER ANY DATABASE ALTER ON DATABASE::<name>
VIEW SERVER STATE VIEW DATABASE STATE inherited from ALTER AUTHORIZATION at a higher level.
Connect and Authentication – Server Permissions CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON APPLICATION ROLE::<name> ALTER ANY SERVICE ALTER ON SERVICE::<name>
STATEMENTS:
CONTROL SERVER CONTROL ON LOGIN::<name>
ALTER SERVICE
DROP SERVICE
Database Permissions – Schema Objects VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON APPLICATION ROLE::<name> CREATE SERVICE CREATE SERVICE

Object Permissions
VIEW ANY DEFINITION VIEW DEFINITION ON LOGIN::<name> Server Permissions Database Permissions Schema Permissions Type Permissions ALTER ANY DATABASE ALTER ON DATABASE::<name>
IMPERSONATE ON LOGIN::<name> STATEMENTS:
XML Schema Collection Permissions
ALTER ANY LOGIN ALTER ON LOGIN::<name> EXECUTE AS CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON REMOTE SERVICE BINDING::<name>
ALTER ANY APPLICATION ROLE ALTER ON APPLICATION ROLE::<name>
CONTROL ON SERVER CONTROL ON DATABASE::<name> CONTROL ON SCHEMA ::<name> CONTROL ON OBJECT|TYPE|XML SCHEMA COLLECTION ::<name>
STATEMENTS:
STATEMENTS:
ALTER APPLICATION ROLE
ALTER LOGIN, sp_addlinkedsrvlogin VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON REMOTE SERVICE BINDING::<name>
DROP APPLICATION ROLE
DROP LOGIN TAKE OWNERSHIP ON REMOTE SERVICE BINDING::<name>
CREATE APPLICATION ROLE
CREATE LOGIN TAKE OWNERSHIP ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name>
RECEIVE ON OBJECT::<queue name> ALTER ANY DATABASE ALTER ON DATABASE::<name>
CONNECT SQL SELECT ON OBJECT::<queue name>
TAKE OWNERSHIP ON SCHEMA::<name> ALTER ANY REMOTE SERVICE BINDING ALTER ON REMOTE SERVICE BINDING::<name>
Notes:
VIEW CHANGE TRACKING ON SCHEMA::<name> VIEW CHANGE TRACKING ON OBJECT::<name> STATEMENTS:
• The CREATE LOGIN statement creates a login and grants CONNECT SQL to that login.
SELECT ON DATABASE::<name> SELECT ON SCHEMA::<name> SELECT ON OBJECT::<table |view name> Symmetric Key Permissions ALTER REMOTE SERVICE BINDING
• Enabling a login (ALTER LOGIN <name> ENABLE) is not the same as granting CONNECT SQL permission.
INSERT ON DATABASE::<name> INSERT ON SCHEMA::<name> INSERT ON OBJECT::< table |view name> DROP REMOTE SERVICE BINDING
• To map a login to a credential, see ALTER ANY CREDENTIAL. CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON SYMMETRIC KEY::<name>
UPDATE ON DATABASE::<name> UPDATE ON SCHEMA::<name> UPDATE ON OBJECT::< table |view name> CREATE REMOTE SERVICE BINDING CREATE REMOTE SERVICE BINDING
• When contained databases are enabled, users can access SQL Server without a login. See database user
DELETE ON DATABASE::<name> DELETE ON SCHEMA::<name> DELETE ON OBJECT::< table |view name>
permissions.
EXECUTE ON DATABASE::<name> EXECUTE ON SCHEMA::<name> EXECUTE ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name>
• To connect using a login you must have :
REFERENCES ON DATABASE::<name> REFERENCES ON SCHEMA::<name> REFERENCES ON OBJECT|TYPE|XML SCHEMA COLLECTION:<name>
o An enabled login
VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON SCHEMA::<name> VIEW DEFINITION ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name> CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON CONTRACT::<name>
o CONNECT SQL VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON SYMMETRIC KEY::<name>
TAKE OWNERSHIP ON DATABASE::<name>
o CONNECT for the database (if specified) REFERENCES ON DATABASE::<name> REFERENCES ON SYMMETRIC KEY::<name>
VIEW ANY DATABASE
CONTROL ON ENDPOINT::<name> ALTER ANY DATABASE ALTER ON DATABASE::<name> TAKE OWNERSHIP ON SYMMETRIC KEY::<name>
ALTER ANY DATABASE ALTER ON DATABASE::<name> VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON CONTRACT::<name>
ALTER ANY SCHEMA ALTER ON SCHEMA::<name> ALTER ON OBJECT|TYPE|XML SCHEMA COLLECTION::<name> REFERENCES ON DATABASE::<name> REFERENCES ON CONTRACT::<name>
VIEW ANY DEFINITION ALTER ANY SYMMETRIC KEY ALTER ON SYMMETRIC KEY::<name>
CREATE SCHEMA CREATE SEQUENCE Note: OPEN SYMMETRIC KEY requires TAKE OWNERSHIP ON CONTRACT::<name>
CONNECT ON ENDPOINT::<name>
TAKE OWNERSHIP ON ENDPOINT::<name> OBJECT permissions apply to the following database objects: VIEW DEFINITION permission on the ALTER ANY DATABASE ALTER ON DATABASE::<name>
STATEMENTS:
CREATE AGGREGATE AGGREGATE key (implied by any permission on the
VIEW DEFINITION ON ENDPOINT::<name> ALTER SYMMETRIC KEY
ALTER ANY ENDPOINT CREATE DEFAULT DEFAULT key), and requires permission on the ALTER ANY CONTRACT ALTER ON CONTRACT::<name>
ALTER ON ENDPOINT::<name> DROP SYMMETRIC KEY
CREATE FUNCTION FUNCTION key encryption hierarchy. CREATE SYMMETRIC KEY CREATE SYMMETRIC KEY STATEMENTS:
STATEMENTS: CREATE PROCEDURE PROCEDURE DROP CONTRACT
ALTER ENDPOINT CREATE QUEUE QUEUE CREATE CONTRACT CREATE CONTRACT
DROP ENDPOINT CREATE RULE RULE
CREATE ENDPOINT CREATE ENDPOINT CREATE SYNONYM SYNONYM
CREATE TABLE TABLE Asymmetric Key Permissions
CREATE TYPE VIEW
CREATE VIEW (All permissions do not apply to all objects. For example CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON ASYMMETRIC KEY::<name> CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON ROUTE::<name>
CREATE XML SCHEMA COLLECTION
Server Role Permissions UPDATE only applies to tables and views.)

CONTROL SERVER CONTROL ON SERVER ROLE::<name>


VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON ROUTE::<name>
VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON ASYMMETRIC KEY::<name>
Notes: TAKE OWNERSHIP ON ROUTE::<name>
• To drop an object (such as a table) you must have ALTER permission on the schema or CONTOL REFERENCES ON DATABASE::<name> REFERENCES ON ASYMMETRIC KEY::<name>
• To create a schema object (such as a table) you must have CREATE permission for that object type
plus ALTER ON SCHEMA::<name> for the schema of the object. Might require REFERENCES ON permission on the object. ALTER ON DATABASE::<name> TAKE OWNERSHIP ON ASYMMETRIC KEY::<name> ALTER ANY DATABASE ALTER ON DATABASE::<name>
ALTER ANY DATABASE
VIEW ANY DEFINITION VIEW DEFINITION ON SERVER ROLE::<name> OBJECT::<name> for any referenced CLR type or XML schema collection. • To create an index requires ALTER OBJECT::<name> permission on the table or view.
TAKE OWNERSHIP ON SERVER ROLE::<name> • To alter an object (such as a table) you must have ALTER permission on the object (or schema ),or • To create or alter a trigger on a table or view requires ALTER OBJECT::<name> on the table or view. ALTER ANY ROUTE ALTER ON ROUTE::<name>
ALTER ANY SERVER ROLE ALTER ON SERVER ROLE::<name> • To create statistics requires ALTER OBJECT::<name> on the table or view. ALTER ANY ASYMMETRIC KEY ALTER ON ASYMMETRIC KEY::<name>
CONTOL permission on the object. STATEMENTS:

Note: ADD SIGNATURE requires ALTER ROUTE


STATEMENTS:
STATEMENTS: DROP ROUTE
CONTROL permission on the key, and ALTER ASYMMETRIC KEY
ALTER SERVER ROLE <name> ADD MEMBER CREATE ROUTE CREATE ROUTE
requires ALTER permission on the DROP ASYMMETRIC KEY
DROP SERVER ROLE
CREATE SERVER ROLE CREATE SERVER ROLE
Full-text Permissions object. CREATE ASYMMETRIC KEY CREATE ASYMMETRIC KEY

NOTES: To add a member to a fixed server role, you must be a member of


CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON MESSAGE TYPE::<name>
that fixed server role, or be a member of the sysadmin fixed server role. CONTROL ON SEARCH PROPERTY LIST::<name>
CONTROL SERVER CONTROL ON DATABASE::<name> CONTROL ON FULLTEXT STOPLIST::<name>
CONTROL ON FULLTEXT CATALOG::<name> Event Notification Permissions

Availability Group Permissions CONTROL SERVER CONTROL ON DATABASE::<name>


VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON MESSAGE TYPE::<name>
REFERENCES ON DATABASE::<name> REFERENCES ON MESSAGE TYPE::<name>
VIEW DEFINITION ON SEARCH PROPERTY LIST::<name>
TAKE OWNERSHIP ON MESSAGE TYPE::<name>
CONTROL SERVER CONTROL ON AVAILABILITY GROUP::<name> VIEW ANY DEFINITION VIEW DEFINITION ON DATABASE::<name> VIEW DEFINITION ON FULLTEXT STOPLIST::<name>
ALTER ON DATABASE::<name> ALTER ANY DATABASE ALTER ON DATABASE::<name>
VIEW DEFINITION ON FULLTEXT CATALOG::<name>

ALTER ANY MESSAGE TYPE ALTER ON MESSAGE TYPE::<name>


REFERENCES ON SEARCH PROPERTY LIST::<name> ALTER ANY EVENT NOTIFICATION ALTER ANY DATABASE EVENT NOTIFICATION Database scoped event notifications
STATEMENTS:
REFERENCES ON DATABASE::<name> REFERENCES ON FULLTEXT STOPLIST::<name>
VIEW ANY DEFINITION VIEW DEFINITION ON AVAILABILITY GROUP::<name> ALTER MESSAGE TYPE
REFERENCES ON FULLTEXT CATALOG::<name>
TAKE OWNERSHIP ON AVAILABILITY GROUP::<name> CREATE DDL EVENT NOTIFICATION CREATE DATABASE DDL EVENT NOTIFICATION Database scoped DDL event notifications DROP MESSAGE TYPE
ALTER ANY AVAILABILITY GROUP ALTER ON AVAILABILITY GROUP::<name> CREATE MESSAGE TYPE CREATE MESSAGE TYPE
TAKE OWNERSHIP ON FULLTEXT CATALOG::<name> TAKE OWNERSHIP ON FULLTEXT STOPLIST::<name> TAKE OWNERSHIP ON SEARCH PROPERTY LIST::<name>
Event notifications on trace events CREATE QUEUE
CREATE TRACE EVENT NOTIFICATION
STATEMENTS:
ALTER ANY DATABASE ALTER ON DATABASE::<name>
ALTER AVAILABILITY GROUP
DROP AVAILABILITY GROUP
ALTER ON SEARCH PROPERTY LIST::<name>
CREATE AVAILABILITY GROUP CREATE AVAILABILITY GROUP Note: EVENT NOTIFICATION permissions also affect service
ALTER ANY FULLTEXT CATALOG ALTER ON FULLTEXT STOPLIST::<name>
broker. See the service broker chart for more into.
ALTER ON FULLTEXT CATALOG::<name> Notes:
• The user executing the CREATE CONTRACT statement must have REFERENCES permission on all message types
STATEMENTS: specified.
CREATE FULLTEXT CATALOG • The user executing the CREATE SERVICE statement must have REFERENCES permission on the queue and all
ALTER FULLTEXT CATALOG contracts specified.
STATEMENTS: • To execute the CREATE or ALTER REMOTE SERVICE BINDING the user must have impersonate permission for
CREATE FULLTEXT CATALOG
ALTER FULLTEXT STOPLIST Replication Permissions the principal specified in the statement.
• When the CREATE or ALTER MESSAGE TYPE statement specifies a schema collection, the user executing the
Questions and comments to Rick.Byham@Microsoft.com CREATE FULLTEXT STOPLIST
STATEMENTS:
statement must have REFERENCES permission on the schema collection specified.
ALTER SEARCH PROPERTY LIST CONTROL SERVER CONTROL ON DATABASE::<name> • See the ALTER ANY EVENT NOTIFICATION chart for more permissions related to Service Broker.
CREATE SEARCH PROPERTY LIST • See the SCHEMA OBJECTS chart for QUEUE permissions.
• The ALTER CONTRACT permission exists but at this time there is no ALTER CONTRACT statement.

CONNECT REPLICATION ON DATABASE::<name>


STATEMENTS:
DROP FULLTEXT CATALOG Notes:

DROP FULLTEXT STOPLIST • Creating a full-text index requires ALTER permission on the table and REFERENCES permission on the full-text catalog.
CONNECT ON DATABASE::<name>
• Dropping a full-text index requires ALTER permission on the table.
March 28, 2012 DROP FULLTEXT SEARCH PROPERTYLIST

© 2012 Microsoft Corporation. All rights reserved.

Das könnte Ihnen auch gefallen