SQL Database Security for ASP.Net

I am trying to provide an MSSQL database for our .Net website.

I wanted to divide the database into different schemes, so that we had a scheme like “Account”, which had personal information and schemes, such as “Publishing”, which had common data of common content.

Each of these schemes will be available using different SQL user accounts, and each of them will need its own DBML, since they will require separate connection strings (we use LINQtoSQL).

My colleague claims that since we only have both of these accounts in our web.config, this project is no more secure than just using a single SQL Server account that has access to the entire database. There is no need to separate the schemes, since we do not use Windows-based authentication.

So my question is: who is right? Will database splitting be more secure? Or is it a waste of time since both SQL accounts will be located in the web.config file (even if they are encrypted)?

+3
source share
3 answers

Your colleague is mistaken on one level and right on another.

, , , , SQL-. , ...

, - web.config.

.

, :

http://msdn.microsoft.com/en-us/library/ms998372.aspx

, googling . , , - web.config.

, web.config...

+1

, SQL Injection. , , . , , , . Wether , , , , .

web.config , ASP , .

, , , . . , , , web.config.

+1

Well, if you encrypt the section where the accounts are located, I don’t see what the problem is. The only problem might be pooling, it will fragment the pool in 2 so that it.

0
source

Source: https://habr.com/ru/post/1718048/


All Articles