Solved

Securty and Efficiency

Posted on 2009-05-13
1
176 Views
Last Modified: 2012-05-06
I have five users that I need to connectto a new SQL Server that has 40 databases on it. All are peers and I want to konw the best way to handle Logins and database permissions.
Logins: I should create a group on the domain with each user then one login to the server?
Database Users and Roles - I Create a User (with that one group login) and then Create a Role with Permissions?
And I would have to do that for each of the 40 databases?

I am confused on how to set up security for multiple users, all of whom are equal.
0
Comment
Question by:SeTech
1 Comment
 
LVL 13

Accepted Solution

by:
St3veMax earned 500 total points
ID: 24377739
If all of the users are equal and need to see the same things; Create an AD Group; Put them in it; Add that group into SQL Server and create a role with permissions.

You would need to do that for each DB; You could re-use your script though to make it easier.

HTH
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question