Online Documentation for SQL Administrator for SQL Server
Setting permissions
This section allows you to grant different permissions to the application role.
This section is available only when editing an existing application role.
Select a Securable type in the Permissions tab on the left of the window to be displayed in the main working window.
The Securable object column contains the list of objects of the selected type (or Permission column in case of Database permission securable type); each subsequent column corresponds to the permission which can be granted on the selected object:
State (for database permissions);
Select, Insert, Update, Delete, References, Alter, Control, Take ownership, View definition, View change tracking (for tables);
Select, Insert, Update, Delete, References, Alter, Control, Take ownership, View definition (for views, inline table-valued functions);
Execute, Alter, Control, Take ownership, View definition (for procedures, extended procedures);
Select, References, Alter, Control, Take ownership, View definition (for table-valued functions)
Execute, References, Alter, Control, Take ownership, View definition (for scalar functions, aggregate functions, XML schema collections)
Select, Insert, Update, Delete, Execute, Control, Take ownership, View definition (for synonyms);
Execute, References, Control, Take ownership, View definition (for data types);
Select, Insert, Update, Delete, Execute, References, Alter, Control, Take ownership, View definition (for schemas);
Alter, Control, Take ownership, View definition (for roles, routes, remote service bindings);
Alter, Control, Impersonate, View definition (for users);
Alter, Control, View definition (for application roles);
References, Alter, Control, Take ownership, View definition (for assemblies, full-text catalogs, certificates, asymmetric keys, symmetric keys, message types, contracts, );
Select, Receive, References, Alter, Control, Take ownership, View definition (for queues);
Send, Alter, Control, Take ownership, View definition (for services).
To learn more about setting permissions for a login see the Database Permissions topic.