37
Session Session VDA306 VDA306 Dealing with SQL Security Dealing with SQL Security from ADO.NET from ADO.NET Fernando G. Guerrero Fernando G. Guerrero SQL Server MVP SQL Server MVP .NET Technical Lead .NET Technical Lead QA plc QA plc October 2002 October 2002

Dealing with SQL Security from ADO.NET

Embed Size (px)

DESCRIPTION

An old presentation from 2002, on security and .NET development

Citation preview

Page 1: Dealing with SQL Security from ADO.NET

Session Session VDA306VDA306

Dealing with SQL Security Dealing with SQL Security from ADO.NETfrom ADO.NET

Fernando G. GuerreroFernando G. GuerreroSQL Server MVPSQL Server MVP

.NET Technical Lead.NET Technical LeadQA plcQA plc

October 2002October 2002

Page 2: Dealing with SQL Security from ADO.NET

VS.NET Connections

Quick info about FernandoQuick info about Fernando(2 milliseconds)(2 milliseconds)

QA• MCSD, MCSE+Internet (W2K), MCDBA, MCT,

SQL Server MVP

• This is where I work: QA, The best learning environment in Europe

• Writing for SQL Sever Magazine and SQL Server Professional

• This is my main web site: www.callsql.com

• This is my book (so far):– Microsoft SQL Server 2000 Programming by

Example (ISBN : 0789724499, co-authored with Carlos Eduardo Rojas)

• Currently writing on ADO.NET and SQL Server 2000

Page 3: Dealing with SQL Security from ADO.NET

VS.NET Connections

Agenda Agenda

• SQL Server Authentication modes• Access to SQL Server Databases• Application security using SQL Server 2000

and ADO.NET

• Note: as this is a VS.NET session, I’ll show you as much ADO.NET, VB.NET and SQL-DMO code as possible, but you need to know about how SQL Server deals with security as well

Page 4: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server Authentication modesSQL Server Authentication modes

• SQL Server Authentication– SQL Server specific logins

– Not recommended for Windows users

– Specify UID/PWD in the ConnectionString

• Windows integrated– Create logins for Windows groups, not users

– Deny access to SQL Server by creating Windows logins in SQL Server

– Specify Trusted_Connection=true in the ConnectionString

Page 5: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server AuthenticationSQL Server Authentication

• Easy to understand• Independent of the Windows Domain structure• Not too flexible• Easier to break• Connection pooling unfriendly

Page 6: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server Authentication (2)SQL Server Authentication (2)

• Most applications still connect as sa and no password (or password as password)

• Could provide an extra layer of authentication• IIS+NT friendly• If you write your UID/PWD in the connection

string, someone could read it• Connection pooling friendly

Page 7: Dealing with SQL Security from ADO.NET

VS.NET Connections

How to create SQL Server How to create SQL Server logins programmatically from logins programmatically from

Visual Basic .NET (demo)Visual Basic .NET (demo)

Page 8: Dealing with SQL Security from ADO.NET

VS.NET Connections

Windows AuthenticationWindows Authentication

• Easier to administer in the long run

• Complex security combinations– NT Groups to reflect actual business structure– Combinations of groups give actual

permissions

• Comprehensive security control based on Windows NT / 2000 / .NET security:– Password policies– Location and time control

– Automatic account blocking

Page 9: Dealing with SQL Security from ADO.NET

VS.NET Connections

Windows Authentication (2)Windows Authentication (2)

• Grant access to lots of users in a single shot

• Deny access to lots of users in a single shot too

• Make code easier to deploy and maintain

• You don’t write your UID/PWD in the connection string, so it is more difficult to hack

Page 10: Dealing with SQL Security from ADO.NET

VS.NET Connections

Connection Strings and Connection Strings and Windows authentication in Windows authentication in

ADO.NET (demo)ADO.NET (demo)

Page 11: Dealing with SQL Security from ADO.NET

VS.NET Connections

How to create programmatically How to create programmatically Windows logins in SQL Server Windows logins in SQL Server 2000 from Visual Basic .NET 2000 from Visual Basic .NET

(demo)(demo)

Page 12: Dealing with SQL Security from ADO.NET

VS.NET Connections

Using SQL-DMO from VB.NET to Using SQL-DMO from VB.NET to manage the authentication manage the authentication

mode, and SQL Server securitymode, and SQL Server security

• In this demonstration you will see how to:– Change the SQL Server Authentication

Mode– Manage SQL Server logins

• And we will do it by using VB.NET with:– SQL-DMO– SQLCommand objects

Page 13: Dealing with SQL Security from ADO.NET

VS.NET Connections

The nasty error 18452 The nasty error 18452

• SQL Server is configured for Windows Authentication only:– Not even the sa can login

• Before changing to Mixed authentication mode, give a strong password to the sa login!

Page 14: Dealing with SQL Security from ADO.NET

VS.NET Connections

What if you dropped the What if you dropped the Builtin/Administrators login?Builtin/Administrators login?

• Unless you have a valid login to access SQL Server, you are into troubles

• You can start a new session using the Windows service account and create the appropriate logins

• Or edit the registry and change the value of the following key to 2:– Default instance:

• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\MSSQLServer\LoginMode

– Named instances:• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft

SQL Server\InstanceName\MSSQLServer\LoginMode

Page 15: Dealing with SQL Security from ADO.NET

VS.NET Connections

Fixed Server RolesFixed Server Roles

• Administrative groups to easier server-wide permissions– Sysadmin: They can do anything, SQL Server

permissions don’t affect them

• Other roles are subsets of sysadmin, for better permissions’ granularity:– setupadmin– securityadmin– processadmin– dbcreator– diskadmin– bulkadmin

Page 16: Dealing with SQL Security from ADO.NET

VS.NET Connections

How to use Server Roles from How to use Server Roles from ADO.NETADO.NET

• Simply put: you don’t

• The connection gets automatically server role membership according to the login used to connect to SQL Server

• To get the permission path used to connect to SQL Server, execute:– xp_logininfo [DomainName\UserName]

Page 17: Dealing with SQL Security from ADO.NET

VS.NET Connections

Getting role membership informationGetting role membership information• Use the IS_SRVROLEMEMBER function• Execute the sp_helpsrvrolemember stored

procedure• Use the ListMembers method from SQL-DMO• Execute this query for actual logins defined in

SQL Server:SELECT 'ServerRole' = spv.nameFROM master.dbo.spt_values spvJOIN master.dbo.sysxlogins lgnON spv.low = 0

AND spv.type = 'SRV' AND lgn.srvid IS NULL AND spv.number & lgn.xstatus = spv.number

WHERE lgn.sid = SUSER_SID('LoginName')

Page 18: Dealing with SQL Security from ADO.NET

VS.NET Connections

Trying (unsuccessfully) to apply Trying (unsuccessfully) to apply permissions to sysadmin permissions to sysadmin

members (demo)members (demo)

Page 19: Dealing with SQL Security from ADO.NET

VS.NET Connections

AgendaAgenda

• SQL Server Authentication modes

• Access to SQL Server Databases

• Application security using SQL Server 2000 and ADO.NET

Page 20: Dealing with SQL Security from ADO.NET

VS.NET Connections

Access to SQL Server Access to SQL Server DatabasesDatabases

• A login gives you access to SQL Server• To access a database, you need a user on that

database• Retrieve the current login using the

SYSTEM_USER function• Retrieve the current user using the

CURRENT_USER function• It doesn’t matter how many Windows groups you

belong to: SQL Server knows you.• The dbo user• The guest user

Page 21: Dealing with SQL Security from ADO.NET

VS.NET Connections

Fixed Database RolesFixed Database Roles

• A very important one: Public– Everybody belongs to Public– Useful to set default permissions

• Other roles simplify permissions:• db_owner• db_accessadmin / db_securityadmin• db_ddladmin• db_backupoperator• db_datareader / db_denydatareader• db_datawriter / db_denydatawriter

Page 22: Dealing with SQL Security from ADO.NET

VS.NET Connections

Do db_owner members have all Do db_owner members have all permissions they think they permissions they think they

have? (demo)have? (demo)

Page 23: Dealing with SQL Security from ADO.NET

VS.NET Connections

AgendaAgenda

• SQL Server Authentication modes• Access to SQL Server Databases• Application security using SQL

Server 2000 and ADO.NET

Page 24: Dealing with SQL Security from ADO.NET

VS.NET Connections

Application security using SQL Application security using SQL Server 2000 and ADO.NETServer 2000 and ADO.NET

• You can deny permissions to every user on all access to tables

• Grant permissions to use views• Grant permissions to execute stored procedures• As long as all of them have the same owner, user

will need permissions only on views / stored procedures

• SQL Server won’t check permissions on underlying objects / statements

• It doesn’t work with dynamic execution

Page 25: Dealing with SQL Security from ADO.NET

VS.NET Connections

Testing application security with Testing application security with views and stored procedures views and stored procedures

from ADO.NET (demo)from ADO.NET (demo)

Page 26: Dealing with SQL Security from ADO.NET

VS.NET Connections

Granting and denying permissions Granting and denying permissions on SQL statementson SQL statements

• GRANT Permission TO User/Role:– CREATE DATABASE– CREATE DEFAULT

– CREATE FUNCTION

– CREATE PROCEDURE

– CREATE RULE– CREATE TABLE– CREATE VIEW– BACKUP DATABASE

– BACKUP LOG

Page 27: Dealing with SQL Security from ADO.NET

VS.NET Connections

Granted – Denied - RevokedGranted – Denied - Revoked

• No permissions (not granted nor denied) means I’M SORRY

• Granted means PERHAPS– You might o might not have final permission– Depends on membership on other roles/groups

• Denied means NO WAY– You can’t perform that action, no matter what

• Revoked means I FORGOT ABOUT IT– Your security record has been removed (it could have

been granted or denied in the past)– Effective permissions depend on role/groups

membership

Page 28: Dealing with SQL Security from ADO.NET

VS.NET Connections

Granting and denying permissions Granting and denying permissions on specific database objectson specific database objects

• GRANT Permission ON Object TO User/Role

Page 29: Dealing with SQL Security from ADO.NET

VS.NET Connections

Permissions ErrorsPermissions Errors

• A permission error doesn’t break connections

• A permission error doesn’t break execution

• A permission error doesn’t roll transactions back

• So, it is up to you to check for errors on permissions and take the right action

Page 30: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server application rolesSQL Server application roles

• Defined at Database level

• Password required

• Don’t have any members

• Always belong to Public role

• May belong to other database roles

• Need to be activated before use

• Cannot be de-activated

• Connection-pooling unfriendly

Page 31: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server application roles SQL Server application roles (Creation)(Creation)

• EXEC sp_addapprole ‘RoleName’, ‘RolePassword’

• It is considered as a special user in the database, not a group

• Grant permissions to the role by using:

• GRANT Permissions ON Object to AppRole

• Deny permissions to the role by using:

• DENY Permissions ON Object to AppRole

Page 32: Dealing with SQL Security from ADO.NET

VS.NET Connections

SQL Server application roles SQL Server application roles (Activation)(Activation)

• EXEC sp_setapprole ‘RoleName’, {Encrypt N ‘Password'}, ‘ODBC‘

• How to protect the password?– Store it in a encrypted file

– Scramble it through the code and protect it against debug mode

– Store it in Active Directory

– Encapsulate this call in a Component

Page 33: Dealing with SQL Security from ADO.NET

VS.NET Connections

Using application roles from Using application roles from ADO.NET (demo)ADO.NET (demo)

Page 34: Dealing with SQL Security from ADO.NET

VS.NET Connections

Passport-like authenticationPassport-like authentication

• Your application can authenticate users from login/password data

• Store open login, encrypted password

• Compare encrypted passwords• Create the entire thing as system

objects

Page 35: Dealing with SQL Security from ADO.NET

VS.NET Connections

Do you want to know more?Do you want to know more?• “Inside SQL Server 2000” (Kalen Delaney, MSPress)• “Advanced Transact-SQL for SQL Server 2000” (Itzik Ben-

Gan & Tom Moreau, APress)• “SQL Server 2000 Programming” (Robert Vieira, WROX)• “Microsoft SQL Server 2000 Programming by Example”

(Fernando G. Guerrero & Carlos Eduardo Rojas, QUE)

• “System.Data: A Clockwork Link between VB.NET and SQL Server ” (Fernando G. Guerrero, Apress)

• SQL Server 2000 Resource Kit (MSPress & TechNet)• Visit the Microsoft public newsgroups:

– msnews.microsoft.com/microsoft.public.sqlserver.*

Page 36: Dealing with SQL Security from ADO.NET

VS.NET Connections

Thank you! Thank you! Questions?Questions?

• Download the source code of this session from:– http://www.callsql.com/en/articles

• You can contact me at:– [email protected]

Page 37: Dealing with SQL Security from ADO.NET

VS.NET Connections

Thank you!Thank you!

• Please drop off your session evaluations in the basket at the back of the room!

• Your comments are greatly appreciated!