Solved

run job as specific acount

Posted on 2011-03-07
7
230 Views
Last Modified: 2012-05-11
experts,

i have a SQL job queries a database and exports a text file to a specific location. i need to run the jobs under a specific account, so that it has permissions to write to the directory where I'm trying to copy to. This seems like it should be simple, but I can't seem to find a way. on my jop steps, i have a "run as" option, but I can't figure out how to create an account with the needed credentials to populate this drop down.

thanks in advance.
0
Comment
Question by:Butterfield_Cayman
  • 4
  • 3
7 Comments
 
LVL 4

Accepted Solution

by:
Amgad_Consulting_Co earned 250 total points
Comment Utility
you can set that in the job step.

get job properties, step , advanced and the set "run as user" value.

check this link http://blogs.msdn.com/b/varun_sharma/archive/2007/08/30/how-to-run-sql-server-agent-and-sql-server-jobs-with-least-privilege-in-sql-server-2005.aspx
0
 

Author Comment

by:Butterfield_Cayman
Comment Utility
i don't see a "run as user" value on the advanced tab. I see one on the general tab. looks like creating a proxy may be the way to do this?? not 100% sure though.
0
 
LVL 4

Assisted Solution

by:Amgad_Consulting_Co
Amgad_Consulting_Co earned 250 total points
Comment Utility
can you try the one on general tab.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:Butterfield_Cayman
Comment Utility
yep, got that one going - thanks. justr had to create the correct proxy account. thanks for help.
0
 
LVL 4

Expert Comment

by:Amgad_Consulting_Co
Comment Utility
here is how it looks on my side.

 sample
0
 

Author Comment

by:Butterfield_Cayman
Comment Utility
i'm using 2005 - is that 2008? interesting
0
 
LVL 4

Expert Comment

by:Amgad_Consulting_Co
Comment Utility
yes it is SQL 2008
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

When you hear the word proxy, you may become apprehensive. This article will help you to understand Proxy and when it is useful. Let's talk Proxy for SQL Server. (Not in terms of Internet access.) Typically, you'll run into this type of problem w…
The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now