Microsoft
Software
Hardware
Network
Question : sql permissions to use adp
i am trying to set people up to use windows authentication on an adp database connecting to sql rather than using the sa username and password.
in AD i have created 3 groups
SQL Admins, SQL Writers and SQL Readers.
i have added a person in the database to the SQL readers group, and in sql i have given them "Connect SQL" over the instance. and then when i drill down to the actual database they have "Connect" access as well.
Then, i go down to the security section and they have a server role of "Public" a user mapping of DB_Denydatawriter, DB_datareader and Public. The system databases are not ticked at all for them.
When i go into ADP and change it to Windows authentication, i select the server, and then when i go to the database list it shows me the system databases but not the actual database i want them to access.
Any ideas where i am going wrong?
Answer : sql permissions to use adp
Check Security>> Logins >> SQL Readers >> Properties >> User Mapping -- is the ADP database checked?
Random Solutions
ISA Server and Cisco equipment -- will it work/help?
Exchange 2010 Transition, BES 4.1
Delete printers and clear cache in terminal services?
IF / CALL Dos Batch help
What is the difference between members in Admistrators and members in Domain admins.
HTML drop down menues
SQL query - AVG TOP 10
Could not find linked table, problem when adding tables
70-294 practice question
SSIS package : error handling