Solved

Securty and Efficiency

Posted on 2009-05-13
1
174 Views
Last Modified: 2012-05-06
I have five users that I need to connectto a new SQL Server that has 40 databases on it. All are peers and I want to konw the best way to handle Logins and database permissions.
Logins: I should create a group on the domain with each user then one login to the server?
Database Users and Roles - I Create a User (with that one group login) and then Create a Role with Permissions?
And I would have to do that for each of the 40 databases?

I am confused on how to set up security for multiple users, all of whom are equal.
0
Comment
Question by:SeTech
1 Comment
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24377739
If all of the users are equal and need to see the same things; Create an AD Group; Put them in it; Add that group into SQL Server and create a role with permissions.

You would need to do that for each DB; You could re-use your script though to make it easier.

HTH
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I've encountered valid database schemas that do not have a primary key.  For example, I use LogParser from Microsoft to push IIS logs into a SQL database table for processing and analysis.  However, occasionally due to user error or a scheduled task…
INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question