permissions granted to user are insufficient for performing this operation

Posted on 2007-07-27
Last Modified: 2012-05-05
The permissions granted to user 'MRJOHNSON01\MRJOHNSON' are insufficient for performing this operation. I have 'MRJOHNSON01\MRJOHNSON'  as part of the SQL user (admin) group, this is my logon.  Also Im  using the default window authentication.  When I logon on to the Report Manager <servername>/reports,  it request me to login.  When I login I get  the "Home" folder, and there is no "setting link for me to assign the "content Manager" role.

I get this error when I try to "deploy" a report i've just created through the Report Designer.  I had this working on my desktop, but for some reason its not working on my laptop.

How can I correct this problem?
Question by:Mike Johnson

    Author Comment

    by:Mike Johnson
    By the way.... my laptop has Vista Operating System, my desktop where the deploy works has Windows XP.  I've run all the SP's recommended for Vista and everything seems to be working besides the deploy access problem.
    LVL 6

    Expert Comment

    I don't have a solution; just a comment.  

    You've just run into the main reason many people are so slow to "upgrade" to Vista.  It's a security administration nightmare--too many settings that have to be addressed to get things to work, and no easy way to discover which ones you need to worry about.  I would search the Microsoft knowledge base on MSDN, etc., if you don't get an answer here.  I haven't installed Vista yet myself; so I don't have any suggestions for you to try.

    Author Comment

    by:Mike Johnson
    Well it came on my "new" Dell laptop.... I asked for XP but they don't install it anymore.

    Author Comment

    by:Mike Johnson
    Well... one way around the Vista operating system problem is that I purchased and installed VMWare, which let me create a Virtual XP OS on my Vista laptop.
    LVL 6

    Accepted Solution

    Good idea..  There's also Virtual PC from Microsoft... Virtualization is becoming more and more popular.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    If you having speed problem in loading SQL Server Management Studio, try to uncheck these options in your internet browser (IE -> Internet Options / Advanced / Security):    . Check for publisher's certificate revocation    . Check for server ce…
    Recently, when I was asked to create a new SQL 2005 cluster, Microsoft released a new service pack for MS SQL 2005 what is Service Pack 3. When I finished the installation of MS SQL 2005 I found myself troubled why the installation of SP3 failed …
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    25 Experts available now in Live!

    Get 1:1 Help Now