Tech Tip 75176 discussed how to handle user logins via an application's SQL Server as opposed to the 4D Application Server. Whether you are using the On SQL Authentication Database Method or the default 4D Password system, the SQL Server user must end up logged in as a 4D user. In the On SQL Authentication Database Method, the CHANGE CURRENT USER command does that.
By setting up a specific group for the SQL Server connections it is possible to limit table access on a case by case basis. You can limit access to certain groups to read only or read/write, or even full design access. This is done in the SQL pane of the Prefences dialog. An example of that is shown below:
In the example above, dedicated SQL Users are all members of the "SQLUsers" group and 4D users are part of the "4DUsers" group. When connecting via the SQL Server - using the settings above - the 4D users will have full Read/Write access while the dedicated SQL users only have Read access.
You can then log SQL Server users in to limited access groups as shown in Tech Tip 75176.
For more information on limiting database access in general (outside the SQL Server) see the Tech Tip on changes to User Access in 4D v11 SQL.