Edit

Share via


DENY system object permissions (Transact-SQL)

Applies to: SQL Server Azure SQL Database Azure SQL Managed Instance SQL database in Microsoft Fabric

Denies permissions on system objects such as stored procedures, extended stored procedures, functions, and views.

Transact-SQL syntax conventions

Syntax

DENY { SELECT | EXECUTE } ON [ sys. ] system_object TO principal

Arguments

[ sys. ]

The sys qualifier is required only when you're referring to catalog views and dynamic management views.

system_object

Specifies the object on which permission is being denied.

principal

Specifies the principal from which the permission is being revoked.

Remarks

This statement can be used to deny permissions on certain stored procedures, extended stored procedures, table-valued functions, scalar functions, views, catalog views, compatibility views, INFORMATION_SCHEMA views, dynamic management views, and system tables that are installed by SQL Server. Each of these system objects exists as a unique record in the resource database (mssqlsystemresource). The resource database is read-only. A link to the object is exposed as a record in the sys schema of every database.

Default name resolution resolves unqualified procedure names to the resource database. Therefore, the sys qualifier is only required when you're specifying catalog views and dynamic management views.

Caution

Denying permissions on system objects causes applications that depend on them to fail. SQL Server Management Studio uses catalog views and might not function as expected, if you change the default permissions on catalog views.

Denying permissions on triggers and on columns of system objects isn't supported.

Permissions on system objects are preserved during SQL Server upgrades.

System objects are visible in the sys.system_objects catalog view. The permissions on system objects are visible in the sys.database_permissions catalog view in the master database.

The following query returns information about permissions of system objects:

SELECT *
FROM master.sys.database_permissions AS dp
     INNER JOIN sys.system_objects AS so
         ON dp.major_id = so.object_id
WHERE dp.class = 1
      AND so.parent_object_id = 0;
GO

Permissions

Requires CONTROL SERVER permission.

Examples

The following example denies EXECUTE permission on xp_cmdshell to public.

DENY EXECUTE ON sys.xp_cmdshell TO PUBLIC;
GO