SQL Server Row Level Security Deep Dive. Part 2 – Setup and Examples


 

The previous section in this series was an introduction to Row Level Security (RLS) and some use cases. This section focuses on basic setup of RLS, methods for implementing RLS and performance considerations with those implementations. The RLS access predicate is applied to every row returned to a client making performance a big factor in any design. Expensive lookups or other bad designs can hurt not only performance on that table but overall system performance if CPU or IO is heavily impacted.

Basics Define the strategy based on business requirements

Implementing RLS is as much a business endeavour as technical.