Posted by Mark D Powell on 01/03/06 19:32
Craig, it would depend on exactly how the table in question is
constructed and used but some applications provide application based
security. The application might connect to the database using one ID
that is the database owner or has both datareader and datawriter but
via the application limit what end-users can do.
HTH -- Mark D Powell --
[Back to original message]
|