Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Security Overview (Replication)

Topic Status: Some information in this topic is preview and subject to change in future releases. Preview information describes new features or changes to existing features in Microsoft SQL Server 2016 Community Technology Preview 2 (CTP2).

Fundamentally, how to help secure your replication environment is a matter of understanding the authentication and authorization options, understanding appropriate uses of replication filtering features, and learning specific measures for how to help secure each piece of the replication environment. The replication environment includes the Distributor, Publisher, Subscribers, and the snapshot folder. This chapter addresses replication security, but replication security is built on SQL Server security and Windows security. Therefore, you should understand this foundation and the specifics of replication security. For more information about security, see Security Considerations for a SQL Server Installation. For more information about security considerations for Oracle publishing, see the section "Replication Security Model" in the topic Design Considerations and Limitations for Oracle Publishers.

Threat and Vulnerability Mitigation (Replication)

Discusses potential threats to a replication topology and describes ways to reduce those threats.

Identity and Access Control (Replication)

Describes how to use authentication, authorization, and filtering to help secure a replication topology.

Secure Development (Replication)

Describes replication security behavior, replication security best practices, and least permissions for replication.

Secure Deployment (Replication)

Describes how to better secure all components of a replication topology

Community Additions

ADD
Show:
© 2015 Microsoft