INF: SQL Server and User Level SecurityLast reviewed: April 25, 1997Article ID: Q72361 |
The information in this article applies to:
- Microsoft SQL Server version 4.2 for OS/2
SUMMARYSetting up SQL Server under user-level security requires the following three steps:
MORE INFORMATION
Granting Permissions on Named PipesWhen attempting to install SQL Server on top of user-level security, there are several extra steps necessary to prepare the LAN software, the most important of which is to grant permissions on named pipes. In user-level security, IPC$ (interprocess communications) is shared automatically. However, before you can use named pipes, permissions to use them must be granted. Grant permissions through the LAN Manager's NetAdmin screen. The following are the steps necessary to grant everyone on the LAN permission to use pipes. Permissions may be restricted at a later time.
Please note that it is not necessary to start and stop the server for these permissions to become effective. The next step is to set up Microsoft SQL Server for OS/2. For more information on these processes, see Part 5 "User Accounts" of the "Microsoft SQL Server System Administrator's Guide."
Create Login IDsCreate login IDs only for those individuals who are also named users on the LAN. This restriction is unique to user-level security. To add new users, first make them users on the LAN. For more information on creating LAN user accounts, see Chapter 4 "Setting Up User-Level Security" of the "Microsoft LAN Manager Administrator's Guide." Version 2.2.
Create GroupsIn addition to any specialized groups, create a group name called "guest". This is created as a group name, without a user ID. It must be in lowercase letters. Users who log on to the SQL Server as guest, will have the same privileges that have been granted to public.
Grant PermissionsNo privileges exist for users other than system administrator (sa) and database owner (dbo), until they have been granted. In addition, granting permissions in SQL Server is database specific. In other words, permissions in one database may differ considerably from those in another. It is generally advisable to create a script that grants and revokes privileges for each database.
|
Additional query words:
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |