Share via


Securing Replication (Replication Transact-SQL Programming)

Security accounts, logins, and passwords required by replication are supplied when replication is configured and when publications and subscriptions are created. These security settings can be changed at a later time using replication stored procedures.

The following topics detail how to modify replication security settings:

For general information about replication security, see Security Considerations for Replication.