Microsoft
Software
Hardware
Network
Question : sql permissions to use adp
i am trying to set people up to use windows authentication on an adp database connecting to sql rather than using the sa username and password.
in AD i have created 3 groups
SQL Admins, SQL Writers and SQL Readers.
i have added a person in the database to the SQL readers group, and in sql i have given them "Connect SQL" over the instance. and then when i drill down to the actual database they have "Connect" access as well.
Then, i go down to the security section and they have a server role of "Public" a user mapping of DB_Denydatawriter, DB_datareader and Public. The system databases are not ticked at all for them.
When i go into ADP and change it to Windows authentication, i select the server, and then when i go to the database list it shows me the system databases but not the actual database i want them to access.
Any ideas where i am going wrong?
Answer : sql permissions to use adp
Check Security>> Logins >> SQL Readers >> Properties >> User Mapping -- is the ADP database checked?
Random Solutions
Raising events with asynchronous callback from a dll
TimeZone -- CountryCode list
Using SQL to find non-duplicate data.
How to automate the retrieval of data from Access when database name is changing twice a month
Trouble with using FindFirstFile in MFC app
How to control a hidden field on tabs based on main form combobox selection
VLOOKUP Problem
SQL Command in Crystal Reports
Infopath SQL Server Concatenate multiple row values into one string
Replace part of ntext field SQL