Solved

Securty and Efficiency

Posted on 2009-05-13
1
178 Views
Last Modified: 2012-05-06
I have five users that I need to connectto a new SQL Server that has 40 databases on it. All are peers and I want to konw the best way to handle Logins and database permissions.
Logins: I should create a group on the domain with each user then one login to the server?
Database Users and Roles - I Create a User (with that one group login) and then Create a Role with Permissions?
And I would have to do that for each of the 40 databases?

I am confused on how to set up security for multiple users, all of whom are equal.
0
Comment
Question by:SeTech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24377739
If all of the users are equal and need to see the same things; Create an AD Group; Put them in it; Add that group into SQL Server and create a role with permissions.

You would need to do that for each DB; You could re-use your script though to make it easier.

HTH
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I've encountered valid database schemas that do not have a primary key.  For example, I use LogParser from Microsoft to push IIS logs into a SQL database table for processing and analysis.  However, occasionally due to user error or a scheduled task…
Data architecture is an important aspect in Software as a Service (SaaS) delivery model. This article is a study on the database of a single-tenant application that could be extended to support multiple tenants. The application is web-based develope…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question