SQL Server Audit Log Event ID 24145

SourceSQL Server (LOGbinder SQL)
Action GroupDATABASE_PRINCIPAL_IMPERSONATION_GROUP
Windows Security Log
Category
 • Subcategory
Object Access
 • Application Generated
Type Success
Discussions on Event ID 24145
Ask a question about this event

24145: Issued an impersonate within database scope command (action_id IMP class_type USER)

This is an event from SQL Server audit event from LOGbinder SQL generated by Action Group  DATABASE_PRINCIPAL_IMPERSONATION_GROUP.

On this page

A command to switch the execution context of the session to the specified database user was issued

Free Security Log Resources by Randy

Description Fields in 24145

FieldDescription
OccurredWhen event was reported by SQL Server
Authorization resultIf the command passed authorization checks
Session IDID of the session on which the event occurred
User
Server
DatabaseDatabase affected by the event
Original context
 Server loginOriginal context server login
 Database userOriginal context database user
Target context
 IDTarget context ID
 Database userTarget context database user
StatementTransact-SQL statement

Supercharger Free Edition

 

Centrally manage WEC subscriptions.

Free.

 

Where Does This Event Come From?

This Event Is Produced By

Which Integrates with Your SIEM

Examples of 24145

Issued an impersonate within database scope command
A command to switch the execution context of the session to the specified database user was issued
Action Group: DATABASE_PRINCIPAL_IMPERSONATION_GROUP
Occurred: 8/22/2013 6:07:52.0000000 PM
Authorization result: Access allowed
Session ID: 67
User: LB\Administrator
Server: DEV3
Database: TestDatabase
Original Context
  Server login: LB\Administrator
  Database user: dbo
Target Context
  ID: 5
  Database user: TestUser1
Statement: ALTER AUTHORIZATION ON XML SCHEMA COLLECTION::TestSchemaCollection TO TestUser1

For more information, see http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=24145

Keep me up-to-date on the Windows Security Log.
Email*:
*We will NOT share this

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection



 

Additional Resources