SSIS 2014, Part 11 of 11: Security
Interactive

SSIS 2014, Part 11 of 11: Security

LearnNow Online
Updated Aug 22, 2018

Course description

In this course, you’ll start by learning about the typical threats that the security tools in Integration Services help protect against. Then you’ll learn how to control access to packages stored in the Package Store in SQL Server, about the available roles and how to create a custom role, as well as how to sign a package with a digital certificate. Then you’ll learn about the new security features that come with the SSIS Catalog introduced in SQL Server 2012, which more closely emulates the security scheme in the SQL Server database engine.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that you have a basic familiarity with the concept of relational databases and a basic understanding of what SQL Server is and the high-level tools in it, as well as how to create and manage objects using Management Studio. You should also have a basic understanding of how SQL Server implements security, including its authentication and authorization schemes, and how to assign permissions on securable objects to principals. You should know the fundamentals of Transact-SQL to write queries to retrieve data and join data from multiple tables, and how to execute scripts using the query editor in Management Studio. You must also know how to connect to an instance of SQL Server 2012 or 2014 using the various connection dialog boxes in Management Studio and development tools. It will be very helpful, but not absolutely necessary, to have experience with .NET development using Visual Studio 2013 or later for the portions of the course that deal with SQL Server Data Tools (which is a lot of it). At the very least, we’ll assume that you are well familiar with the Visual Studio user interface. This course assumes no prior knowledge of SQL Server Integration Services beyond what is covered in the previous SSIS courses.


Meet the expert

Don Kiely

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Video Runtime

56 Minutes

Time to complete

216 Minutes

Course Outline

Security

IS Security (11:48)

  • Introduction (01:30)
  • Integration Services Security (01:17)
  • Protecting Sensitive Info (02:23)
  • Sensitive Information (01:20)
  • Protection Level (01:35)
  • ProtectionLevel Property Values (03:14)
  • Summary (00:26)

IS Security Demo (12:30)

  • Introduction (00:18)
  • Demo: Package Protection Level (04:15)
  • Demo: EncryptAllWithPassword (04:53)
  • Demo: Examining the Code (02:40)
  • Summary (00:22)

Accessing Packages in SQL (16:05)

  • Introduction (01:27)
  • Integration Services Roles (03:24)
  • Authorize IS Users in SQL Server (00:51)
  • Demo: Authorize Users in SQL (05:02)
  • Demo: Testing Authorization (04:57)
  • Summary (00:22)

Creating a Custom Role (06:38)

  • Introduction (00:18)
  • Demo: Creating a Custom Role (04:37)
  • Signing with Digital Certificates (01:05)
  • Summary (00:37)

Security in the SSIS Catalog (09:07)

  • Introduction (01:16)
  • Securable Objects (01:36)
  • Permissions (01:39)
  • Managing Security (00:34)
  • Demo: Manage Permissions (03:29)
  • Summary (00:31)
;