Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

sybase, how to grant certain system procedure to user

Posted on 2013-06-18
1
Medium Priority
?
645 Views
Last Modified: 2013-06-20
application team have requested me to allow a following permission to one of the user, actually how do we execute selective procedure below to be able to run by users ? I think sso_role will help me but again application team want something limited with sso-role ( not all permission within sso-role )

sso_role (default ON) - what is inside default ? and how do I grant only limited sso_role privileges ?


sp_addlogin_ sp_password_ sp_kill_ sp_unlocklogin_ sp_locklogin_ sp_displaylogin
0
Comment
Question by:motioneye
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 14

Accepted Solution

by:
Jan Franek earned 2000 total points
ID: 39258593
There's the technique allowing selective access to functions requiring sa (or sso) role using CIS. Very good description is at http://www.sypron.nl/grant_sa.html
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A while back, I ran into a situation where I was trying to use the calculated columns feature in SharePoint 2013 to do some simple math using values in two lists. Between certain data types not being accessible, and also with trying to make a one to…
OnPage is proud to be a Gold Sponsor at DevOps Days Boston 2017 taking place at the Cyclorama on September 18th  and 19th.  If you’re attending, please stop by booth 11 and get one of our cool give aways and enter to win one of the many prizes we’re…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question