Current transaction ID in an audit trigger

后端 未结 5 1417
情书的邮戳
情书的邮戳 2020-12-15 10:49

I was looking at storing some form of transaction id from an audit trigger. The solution appeared to be to use sys.dm_tran_current_transaction as in this post SQL Server Tri

相关标签:
5条回答
  • 2020-12-15 11:02

    From SQL Server 2008, Microsoft introduced sys.dm_exec_requests, which is to deprecate sys.sysprocesses. This view returns the transaction_id, and can be called without granting VIEW SERVER STATE. Like sys.sysprocesses, it returns details for the current process if VIEW SERVER STATE is not granted, and all processes if it is.

    0 讨论(0)
  • 2020-12-15 11:07

    You can resolve almost any security problem using code signing. Most granular and finely tuned access control, is just a bit on the hard side to understand.

    Use EXECUTE AS OWNER on the trigger, create a certificate, sign the trigger, drop the private key (so that noone else can use it to ever sign anything again), export the certificate (public key only), import the certificate in master, create a login derived from the certificate, grant authenticate to this login (in order to extend the database execute as impersonation), then grant view server state to this login. This is bullet proof, perfectly controled priviledge control. If the trigger need to be changed, the signing process (including the cert derived login and grants) have to be done again. From a security point of view, this is desired (you are signing a specific variant of the trigger), from operational point of view is rather a pita, but is manageable.

    create table t (i int);
    create table audit (transaction_id int);
    go
    
    create trigger t_audit_trigger
    on t
    with execute as owner
    after insert, update, delete
    as
    begin
        set nocount on;
        insert into audit (transaction_id) 
        select transaction_id from sys.dm_tran_current_transaction;
        if (@@ROWCOUNT != 1)
            raiserror(N'Failed to audit transaction', 16, 1);
    end
    go
    
    create certificate t_audit_view_server
        encryption by password = 'Password#123'
        with subject = N't_audit_view_server'
        , start_date = '08/10/2009';
    go
    
    add signature to t_audit_trigger
        by certificate t_audit_view_server
        with password = 'Password#123';
    go
    
    alter certificate t_audit_view_server
        remove private key;
    
    backup certificate t_audit_view_server
        to file = 'c:\temp\t_audit_view_server.cer';
    go
    
    use master;
    go
    
    create certificate t_audit_view_server
        from file = 'c:\temp\t_audit_view_server.cer';
    go  
    
    create login t_audit_view_server_login
        from certificate t_audit_view_server;
    go
    
    grant authenticate server to t_audit_view_server_login;
    grant view server state to t_audit_view_server_login;
    go
    
    0 讨论(0)
  • 2020-12-15 11:07

    Encrypt the stored procedure and don't share the pw for ViewServerStateLogin. Then you get a black box of sufficient density to satisfy the auditors.

    0 讨论(0)
  • 2020-12-15 11:22

    Starting with SQL Server 2016, you could use CURRENT_TRANSACTION_ID. According to the docs:

    Any user can return the transaction ID of the current session.

    0 讨论(0)
  • 2020-12-15 11:23

    Although not directly answering your question, rather than using a custom built auditing framework, in SQL Server 2008 you could make use of the Change Data Capture Technology.

    See the following reference from Books Online: http://msdn.microsoft.com/en-us/library/bb522489.aspx

    EDIT (Solution, added): Here is a walkthrough of how to create a stored procedure to access the system view, making use of the execute as clause and using impersonation.

    USE MASTER;
    
    select * from sys.dm_tran_current_transaction
    
    --Create a login with view server state permissions
    CREATE LOGIN ViewServerStateLogin
    WITH password = 'Hello123';
    CREATE user ViewServerStateLogin;
    
    --Create a login to test the permissions assignment
    CREATE LOGIN TestViewServerState
    WITH password = 'Hello123';
    CREATE user TestViewServerState;
    
    --Test with Login
    EXECUTE AS LOGIN = 'TestViewServerState';
        --This obviously does not work.
        select * from sys.dm_tran_current_transaction
    revert;
    
    --Grant view server state permission to the ViewServerStateLogin
    GRANT VIEW SERVER state TO ViewServerStateLogin;
    
    --Create a procedure to wrap the call to the system view
    CREATE PROCEDURE proc_TestViewServerState
    
    AS
        SET NOCOUNT ON;
    
        EXECUTE AS LOGIN='ViewServerStateLogin'
    
            select * from sys.dm_tran_current_transaction
    
        revert;
    
    RETURN(0);
    
    --Assign execute permission to the test accounts
    GRANT EXECUTE ON proc_TestViewServerState TO TestViewServerState
    
    --Grant impersonation rights to the test login
    GRANT IMPERSONATE ON LOGIN::ViewServerStateLogin TO TestViewServerState
    
    --Test with Procedure
    EXECUTE AS LOGIN = 'TestViewServerState';
        EXEC proc_TestViewServerState
    revert;
    
    0 讨论(0)
提交回复
热议问题