| 1. | An effective permission is any of the followoing 有效权限可以是下列任意一种: |
| 2. | Evaluates the effective permission of the current user on a securable 评估当前用户对安全对象的有效权限。 |
| 3. | Effective permissions granted to an individual user group are cached on a per user group basis 授予各个用户组的有效权限是基于每个用户组进行缓存的。 |
| 4. | Database role or one with higher effective permissions in your application database 数据库角色中的成员身份(或者其帐户具有更高的有效权限) ,均可提交事件。 |
| 5. | Database role or higher effective permissions can modify subscriber and subscription data 数据库角色中的成员身份(或更高的有效权限) ,均可修改订阅方和订阅数据。 |
| 6. | This built - in function tests whether the current principal has a particular effective permission on a specified securable 此内置函数将测试当前主体对于指定的安全对象是否具有特定的有效权限。 |
| 7. | The effective list of permissions that code receives is determined by the intersection of the permissions obtained by these three levels 代码接收的有效权限列表由这三个级别获得的权限交集所确定。 |
| 8. | To determine whether some other user has an effective permission , the caller must have impersonate permission on that user 若要确定某些其他用户是否具有有效权限,调用方必须对此用户具有impersonate权限。 |
| 9. | However , the effective rights in the target database and the strategy used for message encryption differ slightly between the two approaches 但是,在这两种方法之间,目标数据库中的有效权限和用于消息加密的策略略有不同。 |
| 10. | Database roles , microsoft recommends not changing the permissions granted to these roles , because customized roles make determining effective permissions more difficult 数据库角色成员更改,但是microsoft不建议更改授予这些角色的权限,因为自定义的角色使得确定有效权限更加困难。 |