I think the answer is no but I'm looking to give someone access to a SQL Server
database but I only really want them to have access to one table.
It's easy enough to limit someone to only access one database but have no idea if I can limit to a single table.
My thoughts were to create another database with a synonym to the other table and then limit the access to that database but I wondered if someone could think of a better way.
I'm also not convinced that it will work as I think there will be a conflict of permissions.
The better way is creating securable for that specific table. IT will ask you what are you going to secured; table, view, database. Then you choose the specific table to secure and exclude that user from that table.
Certainly. GRANT the permissions you want.
When you give a user access to a database, look at the roles they are assigned and what rights those roles have.
The problem is that people generally grant too broad permissions in the beginning.
Sure you can. After creating the user and giving them access to the database, grant only select access (or whatever level they need) to that table.
Yes.
While that works, you would probably be better off managing permissions using roles and AD groups.
The problem with looping through all tables and denying access would be if you add a new table.
The important thing is to not give the user 'db_datareader' access to the whole database. Using the UI you can use the User Mapping tab under the login, you can create the user with 'public' access only. Then you can go to the database and grant that user SELECT access to the particular table (by clicking the oddly named "Search" button under Securables tab).
This approach would work with script also of course.