Solved

Securty and Efficiency

Posted on 2009-05-13
1
173 Views
Last Modified: 2012-05-06
I have five users that I need to connectto a new SQL Server that has 40 databases on it. All are peers and I want to konw the best way to handle Logins and database permissions.
Logins: I should create a group on the domain with each user then one login to the server?
Database Users and Roles - I Create a User (with that one group login) and then Create a Role with Permissions?
And I would have to do that for each of the 40 databases?

I am confused on how to set up security for multiple users, all of whom are equal.
0
Comment
Question by:SeTech
1 Comment
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24377739
If all of the users are equal and need to see the same things; Create an AD Group; Put them in it; Add that group into SQL Server and create a role with permissions.

You would need to do that for each DB; You could re-use your script though to make it easier.

HTH
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Recently, when I was asked to create a new SQL 2005 cluster, Microsoft released a new service pack for MS SQL 2005 what is Service Pack 3. When I finished the installation of MS SQL 2005 I found myself troubled why the installation of SP3 failed …
When writing XML code a very difficult part is when we like to remove all the elements or attributes from the XML that have no data. I would like to share a set of recursive MSSQL stored procedures that I have made to remove those elements from …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now