Solved

Trusted User for SQL 2005 Database

Posted on 2014-02-11
2
360 Views
Last Modified: 2014-02-11
I am trying to create a user that has the ability to use the database as a trusted connection. My server is currently sent to Windows and SQL authentication. I have the user sign on using Windows Authentication to the ERP system that connects to the SQL database. I have a Crystal Report that I have written that accesses a view I have created on the SQL database but when I use connect using Trusted Connection it tells me I do not have permission to access the database. What role or should I use to give read-only access to the user?
0
Comment
Question by:tparus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 75

Expert Comment

by:Aneesh Retnakaran
ID: 39850768
You should add that user in the database as a read only user; probably you created the login but missed to create the user under that database -> security -> user  section
0
 
LVL 15

Accepted Solution

by:
Deepak Chauhan earned 500 total points
ID: 39850930
First map the login with concerning database and assign the “db_datareader ” role to that user in the database. Please note , Member of the “db_datareader ” role can only read data from all user tables.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question