Database User Role Management

Posted on 2011-10-19
Last Modified: 2012-05-12
Hi Experts,
I need an answer to the design of an application with Microsoft SQL Server 2008 R2 and Active Directory as the security model.

We have roles in the application for groups of users:
e.g. Manager...etc...etc.
The Manager role is an Active Directory Security Group and added under "Security/Users" in SQL Server.
We assign each role various permissions on stored procedures so they can peform their job function.

Recently we expanded our application to multiple databases. We also ran into the isuse where some users are allowed access as a Manager to one database and not another. Some Managers require access to all databases.

How can I plan the user management so that all users are restricted to one database and a role?
Can I use the existing Active Directory and use a clever design or do I need to change the code?

What I have been told by my developers is this which I don't like!
I would have to created many security groups and assign users individually based on database and role.
and then map these roles to each of the databases. It would also mean having to add users multiple times. Considering we could be expanding to 30+ databases this seem very messy to me and not the best design.

I would appreciated you knowledge and experieince on this problem.
Thanks in advance.
Question by:Joesmail
    LVL 24

    Expert Comment

    MySQL is not SQL Server.  Please click on Request Attention and have the zones changed.  Thanks.
    LVL 50

    Accepted Solution

    Your developers sounds like they are on the mark.  You can create a single role that provides access to all the databases, but you will need a new role once you have a user that requires access to only a single, or several, databases.  The alternative is to apply the settings directly to the users or AD group, but that is really just abstracting the same work into AD instead of SQL Server.  

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Let's review the features of new SQL Server 2012 (Denali CTP3). It listed as below: PERCENT_RANK(): PERCENT_RANK() function will returns the percentage value of rank of the values among its group. PERCENT_RANK() function value always in be…
    This article explains how to reset the password of the sa account on a Microsoft SQL Server.  The steps in this article work in SQL 2005, 2008, 2008 R2, 2012, 2014 and 2016.
    Via a live example combined with referencing Books Online, show some of the information that can be extracted from the Catalog Views in SQL Server.
    This videos aims to give the viewer a basic demonstration of how a user can query current session information by using the SYS_CONTEXT function

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now