>Microsoft's SQL best practices dictate that SQL logins should not be
used in
>favour of native Windows Authentication using an operating system
account,
>but we recognize that often consumers of SQL Server do not often want
to do
>this. (With a Windows account people have access to other operating
system
>services as well as SQL Server, but with just an SQL login they should
only
>be able to access the SQL Services. The latter is the 'more safe'
option in
>the author's opinion)

One way I have worked around the problem of those accounts having access
to other items on the server/OS/domain is when running a Windows 2000 AD
domain, I do the following:

All users are created at the domain level.
Global groups are created for each specific need, such as
SQL_Login_User.
The specific users are members of that group.
I set that group as the primary group for the user.
I can then remove that user from the "Domain Users" group.

That way, the only thing that that user would have access to would be
where Everyone or Authenticated Users have permission, which if we take
permissions on our servers correctly, that will be restricted.

Just a thought.

John Tolmachoff
IT Manager, Network Engineer
RelianceSoft, Inc.
Fullerton, CA  92835
www.reliancesoft.com




Reply via email to