Skip to content

Commit c4b93cc

Browse files
committed
Apply style guide improvements to implicit login creation note
- Fix typo: exe -> exec for sp_defaultlanguage - Apply active voice and second person throughout - Add contractions per Microsoft style (doesn't, can't, isn't) - Format stored procedure names with code style - Improve clarity and conciseness - Align with Microsoft Writing Style Guide standards
1 parent d679835 commit c4b93cc

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

docs/relational-databases/security/authentication-access/create-a-login.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -298,10 +298,11 @@ The login can connect to [!INCLUDE [ssNoVersion](../../../includes/ssnoversion-m
298298
- To grant a permission to a login, see [Grant a Permission to a Principal](grant-a-permission-to-a-principal.md).
299299

300300
> [!NOTE]
301-
> When connecting to SQL Server through a Windows or Active Directory (AD) group, certain operations can result in the creation of a login that is a member of the group without the execution of a create login statement. This *implicit* login creation is by design and is intended to maintain referential integrity of the system metadata within SQL Server. The implicit login does not have explicit connect permission to the database so if the login is removed from the group, that login cannot connect by itself.
302-
> Customers may observe such logins being created automatically when performing certain operations as a member of a Windows group. Examples where this could happen are, *exec sp_defaultdb* and *exe sp_defaultLanguage*.
301+
> When you connect to SQL Server through a Windows or Active Directory (AD) group, certain operations can create an implicit login for your group membership without executing a CREATE LOGIN statement. This implicit login creation maintains referential integrity of system metadata within SQL Server. The implicit login doesn't have explicit connect permission to the database, so if you're removed from the group, that login can't connect by itself.
302+
>
303+
> You might observe implicit logins created automatically when you perform certain operations as a member of a Windows group, such as executing `sp_defaultdb` or `sp_defaultlanguage`.
303304
>
304-
> This behavior is by design and is not planned to be changed. If additional monitoring is required, administrators can implement triggers to detect login creation attempts.
305+
> This behavior is by design and isn't planned to change. If you need additional monitoring, you can implement triggers to detect login creation attempts.
305306
306307
## Related content
307308

0 commit comments

Comments
 (0)