Your SlideShare is downloading. ×
SafePeak Installation - Login permissions requirements
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

SafePeak Installation - Login permissions requirements

219
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
219
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. SafePeak: Login PermissionsMetadata Learning PermissionsSafePeak requires VIEW ANY DEFINITION permission in order to learn the structure of the database andread the definition of stored procedures.This can be done in the following way: 1. Connect to the SQL server instance using SQL server management studio 2. Create a new login for SafePeak 3. Open the server properties (right click on the server and select properties) 4. Select “Permissions” page 5. Find SafePeak user and grant it “View any definition” + Press OK 6. Open the properties of the SafePeak login 7. Select “User Mapping” page 8. Check databases that SafePeak needs access to (or you can just check all of them) + Press OKMetadata Learning Login to Schema mappingFor Metadata purposes we compile a list of Login to default schema for each database.To get this list the user logged for Metadata need to have permission to see other Logins.The easy and simple approach is to grant SafePeak login ALTER ANY LOGIN on SERVER permission.A less convenient yet more secured approach is to grant VIEW DEFINITION permission to SafePeakLogin for each existent Login on the Instance. The problem of this approach is that if a new user isadded a new permission should be granted to SafePeak login.Copyright. SafePeak Technologies Ltd 2009 Page 1