?
Solved

Trusted User for SQL 2005 Database

Posted on 2014-02-11
2
Medium Priority
?
362 Views
Last Modified: 2014-02-11
I am trying to create a user that has the ability to use the database as a trusted connection. My server is currently sent to Windows and SQL authentication. I have the user sign on using Windows Authentication to the ERP system that connects to the SQL database. I have a Crystal Report that I have written that accesses a view I have created on the SQL database but when I use connect using Trusted Connection it tells me I do not have permission to access the database. What role or should I use to give read-only access to the user?
0
Comment
Question by:tparus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 75

Expert Comment

by:Aneesh Retnakaran
ID: 39850768
You should add that user in the database as a read only user; probably you created the login but missed to create the user under that database -> security -> user  section
0
 
LVL 15

Accepted Solution

by:
Deepak Chauhan earned 2000 total points
ID: 39850930
First map the login with concerning database and assign the “db_datareader ” role to that user in the database. Please note , Member of the “db_datareader ” role can only read data from all user tables.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question