Table 6-3 lists the system procedures for reporting information about proxies, object creation, and object access permissions:
To report information on |
Use |
---|---|
Proxies |
system tables |
Users and processes |
sp_who |
Permissions on database objects or users |
sp_helprotect |
Permissions on specific tables |
sp_helprotect |