September 30, 2005 at 8:16 am
Great Article Andy. This helps take some of the mystique out of process.
September 30, 2005 at 8:22 am
Good Work Andy!
September 30, 2005 at 4:46 pm
This was a great beginning article. I would love to see followups where you progressively delve deeper into more complex issues around security.
October 3, 2005 at 4:05 pm
Thanks for an excellent article. You emphasized granting permissions to a role, not to a user for best practice. If we are using an Active Directory group as a login, and bring users in and out of that group, then it can serve the same purpose as a role - right??!!!??? I am not sure on this point. If we can use NT/AD groups, then why bother with roles?
Thanks for any clarifications
Best regards
JD
February 6, 2007 at 3:25 am
Hello,Andy!
i execute T-SQL:
USE Master;
EXEC sp_addlogin testuser,testdb;
USE testdb;
EXEC sp_grantdbaccess testuser;
Why after this i cannot see testuser as a user of database testdb in the Enterprise Manager?
July 18, 2008 at 4:26 am
I want to list database role members and most importantly, script them out. How can I do that?
Manoj Deshpande.
November 24, 2008 at 8:47 pm
Hello,
I recently was given the task as the 1st DBA at my company. It it one of those situations where I have the HUGE task of cleaning up after the years of bad practice. The first horror story I have is that everyone uses the 'sa' account to log in. I need to change this very quickly.
I checked out your article and it was helpful but my question is - how should I set up a system of users? Should there be a login for the developers or should each developer have their own login (of course I am talking about the development server)? I think it would be a huge pain to set up a whole system of logins for everyone in the production department.
How would you handle this situation?
Viewing 7 posts - 31 through 36 (of 36 total)
You must be logged in to reply to this topic. Login to reply