Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

how to allow tech to remote in to sbs 2008 server

Posted on 2010-08-26
7
Medium Priority
?
325 Views
Last Modified: 2012-05-10
I need to allow a programmer to remote onto my sbs 2008 server to work on a custom SQL application.  Should I set him up as an administrator, or use some other account?  If you could reply back with the best practice advice and also instruction on how to set him up: what to activate, what to not activate.
0
Comment
Question by:rodynetwork
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 6

Expert Comment

by:thompsonwireless
ID: 33535361
Don't allow anyone to use your administrator account.  Set up an account with admin rights and you can remove it or change the password if you want.  If you start changing admin passwords there's no telling what services and/or applications may stop working.
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 33535577
Only give him sufficient rights for what is actually needed.

If admin, then a New Admin account.

I would also key  an eye on what he is doing via VNC.

Do a system state backup at a minimum before giving access, and make sure your backups are all working properly.

I hope this helps !
0
 

Author Comment

by:rodynetwork
ID: 33535705
what is VNC?
0
Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

 
LVL 63

Accepted Solution

by:
SysExpert earned 1000 total points
ID: 33535942
Remote control program like RDP, Free open source, but allows shared viewing  ( RDP  does not let you see what is happening at the console )

TightVNC, UltraVNC are both good.

test it and see.

0
 
LVL 6

Expert Comment

by:thompsonwireless
ID: 33535971
If he is a reputable DB administrator you may not have to babysit him.  When I left vendors into our server I don't care to watch over them.  I only want to know he did what he should have.  
0
 
LVL 60

Expert Comment

by:Cliff Galiher
ID: 33537935
Answer has already been accepted, but I'll throw this out there:
Application programmers should not need access to the server *AT ALL.* I did software development in a previous life (including SQL development) and in my current live I've supervised many servers that host custom applications.
SQL Server is inherently a client-server application. An account can be given privileges in SQL server without getting any OS-level privileges, and all database work can be done remotely inclduing very intricate stored procedures, triggers, and other code-level procedures. The applicatoin should be using APIs that any SQL client install provides (whether they use ODBC or something more low-level) and thus server access is ultimately not required for any development work.
I cannot think, in all my years, where legitimate OS access was a required part of application development.
-Cliff
 
0
 

Author Comment

by:rodynetwork
ID: 33538024
Thanks cgaliher.  I am new to watching over my server.  I appreciate your input.  I will make sure I only give permission to access SQL and the development app.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
One of the most important things in an application is the query performance. This article intends to give you good tips to improve the performance of your queries.
Using examples as well as descriptions, and references to Books Online, show the documentation available for datatypes, explain the available data types and show how data can be passed into and out of variables.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question