Not all data should be visible to all users. In multi-user databases, Row-Level Security (RLS) ensures that users only see the data they are authorized to accessโwithout needing complex application logic.
RLS is built into SQL Server, allowing organizations to control access dynamically based on user roles or attributes. This is essential for industries like finance, healthcare, and HR, where data privacy and compliance are critical.
In this post, weโll explore what RLS is, how it works, and how to implement it in SQL Server and Azure SQL.
What is Row-Level Security (RLS)?
RLS is a security feature that restricts access to rows in a table based on user identity or role.
๐น Policy-based filtering โ Users see only permitted rows.
๐น Transparent to applications โ Works at the database level, no app changes required.
๐น Performance-efficient โ Enforced at query runtime.
๐น Supports custom rules โ Restrict access based on username, role, or department.
This makes RLS a powerful tool for securing multi-tenant databases, internal HR records, or financial data.
How Row-Level Security Works
RLS is implemented using Security Policies that enforce filtering logic via inline table-valued functions (TVFs).
โ๏ธ Filter Predicate โ Hides rows from unauthorized users.
โ๏ธ Block Predicate โ Prevents unauthorized modifications.
For example, in an HR database, employees should only see their own salary details, while HR managers see all records.
How to Implement Row-Level Security (RLS) in SQL Server
1๏ธโฃ Create a User Table and Sample Data
Letโs assume we have an Employees table where we want to restrict access:
CREATE TABLE Employees (
EmployeeID INT PRIMARY KEY,
Name NVARCHAR(100),
Department NVARCHAR(50),
Salary DECIMAL(10,2),
UserName NVARCHAR(100) -- Maps to system login
);
GO
INSERT INTO Employees (EmployeeID, Name, Department, Salary, UserName)
VALUES (1, 'Alice', 'HR', 75000, 'alice'),
(2, 'Bob', 'IT', 85000, 'bob'),
(3, 'Charlie', 'Finance', 95000, 'charlie');
GO
2๏ธโฃ Create a Security Predicate Function
This function restricts access based on the current database user:
CREATE FUNCTION dbo.fn_RLS_FilterPredicate(@UserName AS NVARCHAR(100))
RETURNS TABLE
WITH SCHEMABINDING
AS
RETURN SELECT 1 AS AccessResult
WHERE @UserName = SYSTEM_USER; -- Use USER_NAME() for SQL Auth if SQL Auth is a requirement
GO
This means users can only see rows where UserName
matches their login.
3๏ธโฃ Apply the Security Policy
Now, enforce the rule by creating a security policy:
CREATE SECURITY POLICY EmployeeSecurityPolicy
ADD FILTER PREDICATE dbo.fn_RLS_FilterPredicate(UserName)
ON dbo.Employees
WITH (STATE = ON);
GO
Testing Row-Level Security
Now, letโs test RLS by impersonating users:
EXECUTE AS USER = 'alice';
SELECT * FROM Employees;
REVERT;
โ Alice only sees her own record.
EXECUTE AS USER = 'bob';
SELECT * FROM Employees;
REVERT;
โ Bob only sees his own record.
EXECUTE AS USER = 'charlie';
SELECT * FROM Employees;
REVERT;
โ Charlie only sees his own record.
Even if an attacker gains access, they wonโt see unauthorized data! ๐
Advanced Row-Level Security Use Cases
โ๏ธ Multi-Tenant Applications โ Isolate customer data per client.
โ๏ธ Department-Based Security โ Let managers view only their departmentโs records.
โ๏ธ Role-Based Security โ Different access levels for HR, Finance, and IT teams.
โ๏ธ Prevent Data Tampering โ Use Block Predicates to stop unauthorized modifications.
How to Disable Row-Level Security
To remove the security policy, run:
DROP SECURITY POLICY EmployeeSecurityPolicy;
GO
DROP FUNCTION dbo.fn_RLS_FilterPredicate;
GO
RLS is now disabled, and all users can see full table data again.
Best Practices for Using Row-Level Security
โ๏ธ Use USER_NAME() instead of SYSTEM_USER โ For SQL authentication (if required).
โ๏ธ Test with multiple roles โ Ensure users see only the intended data.
โ๏ธ Combine RLS with Column-Level Security โ Restrict access at both row and column levels.
โ๏ธ Monitor performance โ While efficient, RLS can slow down queries if used on very large tables.
Conclusion
Row-Level Security (RLS) is a powerful feature that enhances database security by ensuring users can only see the data they are authorized to access.
โ๏ธ No application changes needed
โ๏ธ Transparent to queries
โ๏ธ Dynamic and scalable
๐น Have you implemented RLS in your SQL Server databases? Get started now: Microsoft Docs – Row-Level Security (RLS)
Leave a Reply