Roles are set at the server level.
The system security officer must grant you permission for working with encryption.
Changing permission types for roles
In the server, click Roles to display a list of the roles on the server.
Double-click the role to open the Role Properties window.
The Role Properties window appears for the role you selected. These tabs tabs describe the information for the role:
General – information on the role, including type and whether or not a password is required.
Logins – logins associated with the role. You can add, remove, or change the login properties on the role.
Exclusivity – you can add, remove, or change properties for role exclusivity.
Command Permissions – shows the various create commands that the role has been granted.
Column Permissions– the database, table, and columns where the role has permissions.
Hierarchy – users mapped to aliased to this login.
Object Permissions – the databases and the columns within the tables where the role has permissions.
Select the Object Permissions tab.
In the Permissions list, select Tables, Stored Procedures, Views, Extended Stored Procedures, or Encryption Keys to change the appropriate permissions.
You can grant these permission types for tables:
Sel – Permission to select
Ins – Permission to insert.
Del – Permission to delete.
Upd – Permission to update.
Ref – Permission to create referential constraints.
Decrypt – Permission to decrypt.
Transfer – Permission to transfer data.
For Stored Procedure and Extended Stored Procedure, you can grant Execute permission.
You can grant these permission types for views:
Sel – Permission to select
Ins – Permission to insert.
Del – Permission to delete.
Upd – Permission to update.
You can grant these permission types for Encryption Keys:
Sel – Permission to select.
Alter Key – Permission to change the default encryption key.
When you finish, click OK or Apply.