We have corporate intranet users using the WinForms application to work with the system with the SQL server behind. An integrated security system is configured, allowing all users to update and remove permissions when application security restrictions are limited by how and where table updates occur.
However, some users are powerful users with SQL query tools at their disposal and directly access the database for reporting. However, with integrated security, they have default update rights for tables where they should not be, because the application applies the rules to updates.
Is this an example of where it is more convenient if the application has a central authenticated login to the SQL system, while users are granted read-only rights for integrated security?
source
share