{"id":7500,"date":"2019-01-09T19:34:29","date_gmt":"2019-01-09T19:34:29","guid":{"rendered":"https:\/\/dbtut.com\/?p=7500"},"modified":"2019-01-09T22:27:36","modified_gmt":"2019-01-09T22:27:36","slug":"grant-revoke-and-deny-commands-in-sql-server-tsql","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/","title":{"rendered":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL)"},"content":{"rendered":"<p>You can use GRANT, REVOKE, and DENY commands on many database objects in SQL Server.<\/p>\n<p>With the <strong>GRANT<\/strong> command, you can authorize a user.<\/p>\n<p>With the <strong>REVOKE<\/strong> command, you can revoke a given authorization.<\/p>\n<p>With the <strong>DENY<\/strong> command, you can deny an authorization. In this article we will examine where we can use these commands.<\/p>\n<p>With GRANT, REVOKE and DENY, you can perform many levels of authorization, canceling privileges, and denying an authorization. In this article, we will examine what we can do at the database, schema and table level.<\/p>\n<h3>GRANT at the database level:<\/h3>\n<p>With the GRANT command, we give the following permissions to the TestLogin on the TestDB database at the database level.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nGRANT ALTER TO [TestLogin]\nGO\nGRANT ALTER ANY APPLICATION ROLE TO [TestLogin]\nGO\nGRANT ALTER ANY ASSEMBLY TO [TestLogin]\nGO\nGRANT ALTER ANY ASYMMETRIC KEY TO [TestLogin]\nGO\nGRANT ALTER ANY CERTIFICATE TO [TestLogin]\nGO\nGRANT ALTER ANY CONTRACT TO [TestLogin]\nGO\nGRANT ALTER ANY DATABASE AUDIT TO [TestLogin]\nGO\nGRANT ALTER ANY DATABASE DDL TRIGGER TO [TestLogin]\nGO\nGRANT ALTER ANY DATABASE EVENT NOTIFICATION TO [TestLogin]\nGO\nGRANT ALTER ANY DATASPACE TO [TestLogin]\nGO\nGRANT ALTER ANY EXTERNAL DATA SOURCE TO [TestLogin]\nGO\nGRANT ALTER ANY EXTERNAL FILE FORMAT TO [TestLogin]\nGO\nGRANT ALTER ANY FULLTEXT CATALOG TO [TestLogin]\nGO\nGRANT ALTER ANY MASK TO [TestLogin]\nGO\nGRANT ALTER ANY MESSAGE TYPE TO [TestLogin]\nGO\nGRANT ALTER ANY REMOTE SERVICE BINDING TO [TestLogin]\nGO\nGRANT ALTER ANY ROLE TO [TestLogin]\nGO\nGRANT ALTER ANY ROUTE TO [TestLogin]\nGO\nGRANT ALTER ANY SCHEMA TO [TestLogin]\nGO\nGRANT ALTER ANY SECURITY POLICY TO [TestLogin]\nGO\nGRANT ALTER ANY SERVICE TO [TestLogin]\nGO\nGRANT ALTER ANY SYMMETRIC KEY TO [TestLogin]\nGO\nGRANT ALTER ANY USER TO [TestLogin]\nGO\nGRANT AUTHENTICATE TO [TestLogin]\nGO\nGRANT BACKUP DATABASE TO [TestLogin]\nGO\nGRANT BACKUP LOG TO [TestLogin]\nGO\nGRANT CHECKPOINT TO [TestLogin]\nGO\nGRANT CONNECT TO [TestLogin]\nGO\nGRANT CONNECT REPLICATION TO [TestLogin]\nGO\nGRANT CONTROL TO [TestLogin]\nGO\nGRANT CREATE AGGREGATE TO [TestLogin]\nGO\nGRANT CREATE ASSEMBLY TO [TestLogin]\nGO\nGRANT CREATE ASYMMETRIC KEY TO [TestLogin]\nGO\nGRANT CREATE CERTIFICATE TO [TestLogin]\nGO\nGRANT CREATE CONTRACT TO [TestLogin]\nGO\nGRANT CREATE DATABASE DDL EVENT NOTIFICATION TO [TestLogin]\nGO\nGRANT CREATE DEFAULT TO [TestLogin]\nGO\nGRANT CREATE FULLTEXT CATALOG TO [TestLogin]\nGO\nGRANT CREATE FUNCTION TO [TestLogin]\nGO\nGRANT CREATE MESSAGE TYPE TO [TestLogin]\nGO\nGRANT CREATE PROCEDURE TO [TestLogin]\nGO\nGRANT CREATE QUEUE TO [TestLogin]\nGO\nGRANT CREATE REMOTE SERVICE BINDING TO [TestLogin]\nGO\nGRANT CREATE ROLE TO [TestLogin]\nGO\nGRANT CREATE ROUTE TO [TestLogin]\nGO\nGRANT CREATE RULE TO [TestLogin]\nGO\nGRANT CREATE SCHEMA TO [TestLogin]\nGO\nGRANT CREATE SERVICE TO [TestLogin]\nGO\nGRANT CREATE SYMMETRIC KEY TO [TestLogin]\nGO\nGRANT CREATE SYNONYM TO [TestLogin]\nGO\nGRANT CREATE TABLE TO [TestLogin]\nGO\nGRANT CREATE TYPE TO [TestLogin]\nGO\nGRANT CREATE VIEW TO [TestLogin]\nGO\nGRANT CREATE XML SCHEMA COLLECTION TO [TestLogin]\nGO\nGRANT DELETE TO [TestLogin]\nGO\nGRANT EXECUTE TO [TestLogin]\nGO\nGRANT INSERT TO [TestLogin]\nGO\nGRANT REFERENCES TO [TestLogin]\nGO\nGRANT SELECT TO [TestLogin]\nGO\nGRANT SHOWPLAN TO [TestLogin]\nGO\nGRANT SUBSCRIBE QUERY NOTIFICATIONS TO [TestLogin]\nGO\nGRANT TAKE OWNERSHIP TO [TestLogin]\nGO\nGRANT UNMASK TO [TestLogin]\nGO\nGRANT UPDATE TO [TestLogin]\nGO\nGRANT VIEW ANY COLUMN ENCRYPTION KEY DEFINITION TO [TestLogin]\nGO\nGRANT VIEW ANY COLUMN MASTER KEY DEFINITION TO [TestLogin]\nGO\nGRANT VIEW DATABASE STATE TO [TestLogin]\nGO\nGRANT VIEW DEFINITION TO [TestLogin]\nGO\n<\/pre>\n<p>with &#8220;<strong>WITH Grant Option<\/strong>&#8220;, we can grant a login to authorize other logins. Can be used in the following ways. I recommend that all authorization be performed by DBAs.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nGRANT ALTER TO [TestLogin] WITH GRANT OPTION\nGO<\/pre>\n<h3>REVOKE at the database level:<\/h3>\n<p>With the help of the REVOKE command, we can revoke the privileges we gave at the database level with GRANT. The use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nREVOKE ALTER TO [TestLogin] AS [dbo]\nGO<\/pre>\n<h3>DENY at the database level:<\/h3>\n<p>With the DENY command, we can deny the above privileges at the database level for a user. The deny command is usually used to prevent some of the high-level privileges from being granted at a low-level. Its use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nDENY ALTER TO [TestLogin]\nGO<\/pre>\n<h3>GRANT at Schema level:<\/h3>\n<p>On a schema, we can use the grant command to grant the following privileges to a user.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nGRANT ALTER ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT CONTROL ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT CREATE SEQUENCE ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT DELETE ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT EXECUTE ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT INSERT ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT REFERENCES ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT SELECT ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT TAKE OWNERSHIP ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT UPDATE ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT VIEW CHANGE TRACKING ON SCHEMA::[testschema] TO [TestLogin]\nGO\nGRANT VIEW DEFINITION ON SCHEMA::[testschema] TO [TestLogin]\nGO\n<\/pre>\n<h3>Revoke at schema level:<\/h3>\n<p>With the Revoke command, we can revoke the privileges granted at the schema level. Its use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nREVOKE ALTER ON SCHEMA::[testschema] TO [TestLogin] AS [dbo]\nGO<\/pre>\n<h3>DENY at schema level:<\/h3>\n<p>With the DENY command, we can deny the above privileges at the schema level for a user. The deny command is usually used to prevent some of the high-level privileges from being granted at a low-level. Its use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nDENY ALTER ON SCHEMA::[testschema] TO [TestLogin]\nGO<\/pre>\n<h3>GRANT at table level:<\/h3>\n<p>We can use the GRANT command on a table to give the following privileges to a user.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nGRANT ALTER ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT CONTROL ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT DELETE ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT INSERT ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT REFERENCES ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT SELECT ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT TAKE OWNERSHIP ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT UPDATE ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT VIEW CHANGE TRACKING ON [dbo].[MyTable] TO [TestLogin]\nGO\nGRANT VIEW DEFINITION ON [dbo].[MyTable] TO [TestLogin]\nGO\n<\/pre>\n<h3>Revoke at table level:<\/h3>\n<p>With the Revoke command, we can revoke the privileges granted at the table level. Its use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nREVOKE ALTER ON [dbo].[MyTable] TO [TestLogin] AS [dbo]\nGO<\/pre>\n<h3>DENY at table level:<\/h3>\n<p>With the DENY command, we can deny the above privileges at the table level for a user. The deny command is usually used to prevent some of the high-level privileges from being granted at a low-level. Its use is as follows.<\/p>\n<pre class=\"lang:default decode:true\">use [TestDB]\nGO\nDENY ALTER ON [dbo].[MyTable] TO [TestLogin]\nGO<\/pre>\n\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_7500\" class=\"pvc_stats all  \" data-element-id=\"7500\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You can use GRANT, REVOKE, and DENY commands on many database objects in SQL Server. With the GRANT command, you can authorize a user. With the REVOKE command, you can revoke a given authorization. With the DENY command, you can deny an authorization. In this article we will examine where we can use these commands. &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_7500\" class=\"pvc_stats all  \" data-element-id=\"7500\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,1596],"tags":[1624,1627,1629,980,1625,1628,540,1626,814],"class_list":["post-7500","post","type-post","status-publish","format-standard","","category-mssql","category-tsql","tag-deny","tag-deny-command","tag-deny-permission","tag-grant","tag-grant-command","tag-grant-permission","tag-revoke","tag-revoke-command","tag-revoke-permission"],"aioseo_notices":[],"a3_pvc":{"activated":true,"total_views":2929,"today_views":1},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials<\/title>\n<meta name=\"description\" content=\"GRANT, REVOKE and DENY in SQL Server(TSQL)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"GRANT, REVOKE and DENY in SQL Server(TSQL)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-09T19:34:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-09T22:27:36+00:00\" \/>\n<meta name=\"author\" content=\"dbtut\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dbtut\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\"},\"author\":{\"name\":\"dbtut\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\"},\"headline\":\"GRANT, REVOKE and DENY Commands in SQL Server(TSQL)\",\"datePublished\":\"2019-01-09T19:34:29+00:00\",\"dateModified\":\"2019-01-09T22:27:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\"},\"wordCount\":410,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"keywords\":[\"DENY\",\"DENY command\",\"deny permission\",\"GRANT\",\"GRANT command\",\"grant permission\",\"REVOKE\",\"REVOKE command\",\"REVOKE Permission\"],\"articleSection\":[\"MSSQL\",\"TSQL\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\",\"name\":\"GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"datePublished\":\"2019-01-09T19:34:29+00:00\",\"dateModified\":\"2019-01-09T22:27:36+00:00\",\"description\":\"GRANT, REVOKE and DENY in SQL Server(TSQL)\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GRANT, REVOKE and DENY Commands in SQL Server(TSQL)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\",\"name\":\"dbtut\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"caption\":\"dbtut\"},\"description\":\"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.\",\"sameAs\":[\"http:\/\/NurullahCAKIR\"],\"url\":\"https:\/\/dbtut.com\/index.php\/author\/dbtut\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials","description":"GRANT, REVOKE and DENY in SQL Server(TSQL)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/","og_locale":"en_US","og_type":"article","og_title":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials","og_description":"GRANT, REVOKE and DENY in SQL Server(TSQL)","og_url":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/","og_site_name":"Database Tutorials","article_published_time":"2019-01-09T19:34:29+00:00","article_modified_time":"2019-01-09T22:27:36+00:00","author":"dbtut","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dbtut","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/"},"author":{"name":"dbtut","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408"},"headline":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL)","datePublished":"2019-01-09T19:34:29+00:00","dateModified":"2019-01-09T22:27:36+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/"},"wordCount":410,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"keywords":["DENY","DENY command","deny permission","GRANT","GRANT command","grant permission","REVOKE","REVOKE command","REVOKE Permission"],"articleSection":["MSSQL","TSQL"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/","url":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/","name":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL) - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"datePublished":"2019-01-09T19:34:29+00:00","dateModified":"2019-01-09T22:27:36+00:00","description":"GRANT, REVOKE and DENY in SQL Server(TSQL)","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2019\/01\/09\/grant-revoke-and-deny-commands-in-sql-server-tsql\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"GRANT, REVOKE and DENY Commands in SQL Server(TSQL)"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408","name":"dbtut","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","caption":"dbtut"},"description":"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.","sameAs":["http:\/\/NurullahCAKIR"],"url":"https:\/\/dbtut.com\/index.php\/author\/dbtut\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/7500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=7500"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/7500\/revisions"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=7500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=7500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=7500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}