The document creates login accounts and database roles to grant limited permissions to services that help manage SQL Server policies. A login called ##MS_PolicyEventProcessingLogin## is created with disabled status and random password for policy event processing. This login is given various permissions in the msdb database and made a member of roles for policy administration and SQL Agent tasks. Another login ##MS_PolicyTsqlExecutionLogin## is similarly created for TSQL execution related to policies.
This document provides code examples for performing CRUD (create, read, update, delete) operations in Java Server Pages (JSP) and MySQL. It includes code for JSP files to display and edit records, as well as Java servlet classes and DAO classes containing SQL statements to interact with the database and implement the CRUD functionality.
phylobase is an R package that provides classes and methods for manipulating phylogenetic trees and associated comparative data. It defines the phylo and phylo4 classes to store phylogenetic tree objects and associate trees with comparative data. The classes allow easy manipulation of trees and data, including plotting trees, retrieving tree structure and topology information, and associating trees with comparative data from different packages in a standardized way. The phylobase package aims to provide a common data structure and base functions for phylogenetic comparative methods in R.
This document summarizes the challenges and solutions for managing a shared MySQL farm across multiple nodes. It discusses using a centralized provisioning database to store user, database, and privilege information and mapping these to the individual MySQL nodes. GeTers on the provisioning database allow retrieving and modifying this mapping information. Quotas and privileges are managed through the provisioning database and INFORMATION_SCHEMA to enable or restrict write access when quotas are exceeded.
This document summarizes Kenichi Ishigaki's presentation on DBD::SQLite recipes, issues, and plans at YAPC::Asia 2012. The presentation covered:
1. Ten recipes for common SQLite tasks like bulk inserts, in-memory databases, table alterations, database attachments, hooks, unicode, and custom extensions.
2. Ten issues and plans for the DBD::SQLite module, including debates around the default transaction mode, refactoring the execute method, optimization efforts, and compatibility with different compilers and platforms like iOS.
3. Questions and suggestions from the audience were welcomed on improving recipes, resolving issues, and advancing plans and roadmaps for DBD::SQLite.
2014 database - course 3 - PHP and MySQLHung-yu Lin
This document discusses connecting to a MySQL database from PHP. It explains how to establish a database connection, perform queries like INSERT, SELECT, UPDATE and DELETE, and handle query results. It emphasizes that using prepared statements prevents SQL injection attacks. It also covers password hashing to securely store passwords in the database by hashing them with a random salt.
The document discusses using SQLite as an embedded SQL database in Adobe AIR applications. SQLite allows storing data in a single file without a separate server. Key features covered include connecting to a SQLite database, executing SQL queries and statements, handling results, and using transactions. The document also provides examples of basic usage and links to additional SQLite resources.
This document provides code examples for performing CRUD (create, read, update, delete) operations in Java Server Pages (JSP) and MySQL. It includes code for JSP files to display and edit records, as well as Java servlet classes and DAO classes containing SQL statements to interact with the database and implement the CRUD functionality.
phylobase is an R package that provides classes and methods for manipulating phylogenetic trees and associated comparative data. It defines the phylo and phylo4 classes to store phylogenetic tree objects and associate trees with comparative data. The classes allow easy manipulation of trees and data, including plotting trees, retrieving tree structure and topology information, and associating trees with comparative data from different packages in a standardized way. The phylobase package aims to provide a common data structure and base functions for phylogenetic comparative methods in R.
This document summarizes the challenges and solutions for managing a shared MySQL farm across multiple nodes. It discusses using a centralized provisioning database to store user, database, and privilege information and mapping these to the individual MySQL nodes. GeTers on the provisioning database allow retrieving and modifying this mapping information. Quotas and privileges are managed through the provisioning database and INFORMATION_SCHEMA to enable or restrict write access when quotas are exceeded.
This document summarizes Kenichi Ishigaki's presentation on DBD::SQLite recipes, issues, and plans at YAPC::Asia 2012. The presentation covered:
1. Ten recipes for common SQLite tasks like bulk inserts, in-memory databases, table alterations, database attachments, hooks, unicode, and custom extensions.
2. Ten issues and plans for the DBD::SQLite module, including debates around the default transaction mode, refactoring the execute method, optimization efforts, and compatibility with different compilers and platforms like iOS.
3. Questions and suggestions from the audience were welcomed on improving recipes, resolving issues, and advancing plans and roadmaps for DBD::SQLite.
2014 database - course 3 - PHP and MySQLHung-yu Lin
This document discusses connecting to a MySQL database from PHP. It explains how to establish a database connection, perform queries like INSERT, SELECT, UPDATE and DELETE, and handle query results. It emphasizes that using prepared statements prevents SQL injection attacks. It also covers password hashing to securely store passwords in the database by hashing them with a random salt.
The document discusses using SQLite as an embedded SQL database in Adobe AIR applications. SQLite allows storing data in a single file without a separate server. Key features covered include connecting to a SQLite database, executing SQL queries and statements, handling results, and using transactions. The document also provides examples of basic usage and links to additional SQLite resources.
PT.BUZOO INDONESIA is No1 Japanese offshore development company in Indonesia.
We are professional of web solution and smartphone apps. We can support Japanese, English and Indonesia.
We are hiring now at http://buzoo.co.id/
The document discusses connecting Java applications to a MySQL database in 5 steps. It provides the necessary information for connecting to a MySQL database including the driver class, connection URL, username, and password. It then shows an example of connecting to a MySQL database, executing a query, and retrieving and printing the results. It also provides examples of connecting two Java frames/forms by passing data between them on a button click event.
The document discusses various DataFrame operations in Spark SQL including reading JSON and text files, programmatically specifying schemas, working with Hive tables, and reading/writing Parquet files. It shows examples of creating DataFrames from different data sources, registering them as tables, and performing SQL queries on the tables including selecting, filtering, grouping and aggregation.
Thijs Feryn gave a presentation on managing a shared MySQL farm. The presentation covered provisioning users and databases across multiple MySQL servers, mapping users and databases to nodes, and managing permissions and privileges for users through SQL statements. Challenges included managing data across nodes and preventing name clashes. The presentation provided solutions like a centralized provisioning database and node mapper to manage users, databases, and privileges across the MySQL farm.
The document discusses Spring configuration and Java-based configuration. It covers topics like using @Configuration classes to define beans, @ComponentScan to find beans, @Bean to define beans, and using Java configuration as an alternative to XML configuration in Spring. It also provides examples of configuring ViewResolvers, controllers and enabling Spring MVC features with annotations like @EnableWebMvc.
ReactiveだけじゃないSpring 5 & Spring Boot 2新機能解説Masatoshi Tada
This document contains diagrams and notes from a presentation about new features in Spring Framework 5.0 for Java 8 and 9. It discusses updated features in areas like core, web, data access, security, testing and Spring Boot to take advantage of newer Java versions. Specific topics mentioned include HTTP/2 support, Bean Validation 2.0, OAuth 2.0 authentication, JUnit 5 integration, and Java 9 module system compatibility in Spring Boot applications.
MySQL is an open-source relational database management system. The document demonstrates how to create and manage a MySQL database called "college" including creating tables, inserting records, updating records, extracting records with conditions, and deleting tables and users. The key steps shown are:
1. The root user creates a database called "college" and a user called "test" who is given access to that database.
2. The test user logs in and creates a table called "staff_register" with fields to store staff details. Records are inserted and updated.
3. Records can be extracted using conditions and the LIKE operator. Tables and users can also be deleted.
The document describes HiveQL commands for creating, altering, and dropping databases, tables, views, and indexes. It also covers built-in functions, SELECT queries with filters, sorting, grouping, and joins. Key commands include CREATE DATABASE, CREATE TABLE, LOAD DATA, ALTER TABLE, DROP TABLE, SELECT, GROUP BY, and JOIN.
This document summarizes Simon Bagreev's experience at the Heroku Waza 2013 conference. It includes:
1) Simon attended talks on various topics related to building applications on Heroku including performance, databases, APIs, and mobile development.
2) Simon found the talks on performance optimization, Heroku secrets, Postgres features, and mobile development to be the most interesting and informative.
3) The Postgres talk in particular made Simon realize how many powerful features are available in Postgres beyond the basic functionality, such as arrays, JSON, full text search and more.
This document provides summaries of various techniques for capturing and analyzing SQL in MySQL databases, including:
1) MySQL's built-in options like the slow query log, general query log, and binary log.
2) Other techniques like MySQL Proxy, TCP/IP capture, Dtrace/SystemTap, and application management.
3) Details on configuring and using the slow query log, general query log, and binary log to analyze SQL performance.
The document provides examples of HTML tags like <address>, <area>, <audio>, <blockquote>, <button>, and others. It shows how each tag is structured and used in a short code sample to define its purpose, like <address> for contact information or <audio> for embedding audio files.
Nesta sessão é objetivo mostrar as novas funcionalidade do HTML5, bem como a integração com tecnologias existentes.
Nesta sessão vão ser abordadas as diferenças existentes entre o HTML 4 e o HTML 5, vai ser possível perceber quais são as novas funcionalidades, novos controlos, integração com tecnologias existentes (CSS e Javascript). Vamos também discutir como fazer offline, ligações ao servidor para enviar ou receber informação e como utilizar o Canvas e o SVG para desenhar em HTML.
Comunidade NetPonto, a comunidade .NET em Portugal!
http://netponto.org
This document compares the performance of using XML-RPC versus Psycopg2 to access and update data in an OpenERP database. It describes programs written in Python using each method and measures the execution times. XML-RPC was slower, taking 3.27 seconds to run compared to 0.25 seconds for Psycopg2. Psycopg2 provides better performance by allowing direct SQL queries rather than going through the ORM. The document concludes that while XML-RPC provides security and compatibility with the OpenERP ORM, Psycopg2 is faster and allows standard SQL queries for better portability.
- The document discusses enhancements and new features in Cassandra 2.1 including user defined types, collection indexing, improved counters, data directory changes, bloom filter improvements, and more efficient repair. It also outlines the new query cache and row cache features in Cassandra.
Optimizing Slow Queries with Indexes and CreativityMongoDB
This document discusses optimizing slow queries in MongoDB through the use of indexes and schema design. It begins with examples of common performance issues like inefficient reads from table scans and writes causing locks. Each example shows the slow query, explains the problem, and proposes a solution like adding an index. It emphasizes that new indexes only scale up to a point and sometimes the best approach is to redesign the schema or add hardware. The talk provides guidance on measuring performance, finding slow queries, determining if they can be indexed, and rephrasing problems in terms of desired queries.
MongoDB.local Sydney 2019: Tips and Tricks for Avoiding Common Query PitfallsMongoDB
Query performance can either be a constant headache or the unsung hero of an application. MongoDB provides extremely powerful querying capabilities when used properly. As a member of the support team I will share common mistakes observed as well as tips and tricks to avoiding them.
MongoDB.local Seattle 2019: Tips & Tricks for Avoiding Common Query PitfallsMongoDB
Query performance can either be a constant headache or the unsung hero of an application. MongoDB provides extremely powerful querying capabilities when used properly. As a member of the support team I will share common mistakes observed as well as tips and tricks to avoiding them.
How to win $10m - analysing DOTA2 data in R (Sheffield R Users Group - May)Paul Richards
Presentation given by Chris Hopkinson at May Sheffield R Users Group meeting - how to (potentially) win $10m using association rules with data from the DOTA2 API
The document discusses Spring Data JPA and entity relationship mappings. It provides examples of mapping entities with relationships like OneToMany and ManyToOne using annotations. It also demonstrates various JPA operations like persisting, updating, deleting entities and querying relationships with examples of the generated SQL.
This document provides information about wild rice, including its history and cultivation. It discusses how wild rice was an important subsistence crop for Indigenous peoples of North America and how it has evolved into a luxury food item. Some key points:
- Wild rice grows naturally in shallow lakes and was a staple crop for Indigenous groups in the Great Lakes region.
- It was carefully managed through traditional ecological knowledge and is now an iconic part of the cultural heritage of that region.
- While once a subsistence food, wild rice is now a high-priced luxury item sold in specialty stores and markets due to its labor-intensive harvesting and processing.
- The author operates a family-run wild rice
This document discusses various DNN database tips and tricks presented by Will Strohl, including how to clear space by deleting old logs, change the dbo role owner when users cannot be created or dropped, change or replace themes by clearing default settings, and take over a site locally by changing the primary alias. The tips are demonstrated through SQL scripts that can automate common database tasks in DNN.
Database Development Replication Security Maintenance Reportnyin27
The document discusses various database administration tasks including:
1. Creating stored procedures, functions, views and indexes
2. Configuring security using roles, permissions and encryption
3. Implementing database maintenance including backups, jobs, partitioning and monitoring
4. Setting up reports and notifications
PT.BUZOO INDONESIA is No1 Japanese offshore development company in Indonesia.
We are professional of web solution and smartphone apps. We can support Japanese, English and Indonesia.
We are hiring now at http://buzoo.co.id/
The document discusses connecting Java applications to a MySQL database in 5 steps. It provides the necessary information for connecting to a MySQL database including the driver class, connection URL, username, and password. It then shows an example of connecting to a MySQL database, executing a query, and retrieving and printing the results. It also provides examples of connecting two Java frames/forms by passing data between them on a button click event.
The document discusses various DataFrame operations in Spark SQL including reading JSON and text files, programmatically specifying schemas, working with Hive tables, and reading/writing Parquet files. It shows examples of creating DataFrames from different data sources, registering them as tables, and performing SQL queries on the tables including selecting, filtering, grouping and aggregation.
Thijs Feryn gave a presentation on managing a shared MySQL farm. The presentation covered provisioning users and databases across multiple MySQL servers, mapping users and databases to nodes, and managing permissions and privileges for users through SQL statements. Challenges included managing data across nodes and preventing name clashes. The presentation provided solutions like a centralized provisioning database and node mapper to manage users, databases, and privileges across the MySQL farm.
The document discusses Spring configuration and Java-based configuration. It covers topics like using @Configuration classes to define beans, @ComponentScan to find beans, @Bean to define beans, and using Java configuration as an alternative to XML configuration in Spring. It also provides examples of configuring ViewResolvers, controllers and enabling Spring MVC features with annotations like @EnableWebMvc.
ReactiveだけじゃないSpring 5 & Spring Boot 2新機能解説Masatoshi Tada
This document contains diagrams and notes from a presentation about new features in Spring Framework 5.0 for Java 8 and 9. It discusses updated features in areas like core, web, data access, security, testing and Spring Boot to take advantage of newer Java versions. Specific topics mentioned include HTTP/2 support, Bean Validation 2.0, OAuth 2.0 authentication, JUnit 5 integration, and Java 9 module system compatibility in Spring Boot applications.
MySQL is an open-source relational database management system. The document demonstrates how to create and manage a MySQL database called "college" including creating tables, inserting records, updating records, extracting records with conditions, and deleting tables and users. The key steps shown are:
1. The root user creates a database called "college" and a user called "test" who is given access to that database.
2. The test user logs in and creates a table called "staff_register" with fields to store staff details. Records are inserted and updated.
3. Records can be extracted using conditions and the LIKE operator. Tables and users can also be deleted.
The document describes HiveQL commands for creating, altering, and dropping databases, tables, views, and indexes. It also covers built-in functions, SELECT queries with filters, sorting, grouping, and joins. Key commands include CREATE DATABASE, CREATE TABLE, LOAD DATA, ALTER TABLE, DROP TABLE, SELECT, GROUP BY, and JOIN.
This document summarizes Simon Bagreev's experience at the Heroku Waza 2013 conference. It includes:
1) Simon attended talks on various topics related to building applications on Heroku including performance, databases, APIs, and mobile development.
2) Simon found the talks on performance optimization, Heroku secrets, Postgres features, and mobile development to be the most interesting and informative.
3) The Postgres talk in particular made Simon realize how many powerful features are available in Postgres beyond the basic functionality, such as arrays, JSON, full text search and more.
This document provides summaries of various techniques for capturing and analyzing SQL in MySQL databases, including:
1) MySQL's built-in options like the slow query log, general query log, and binary log.
2) Other techniques like MySQL Proxy, TCP/IP capture, Dtrace/SystemTap, and application management.
3) Details on configuring and using the slow query log, general query log, and binary log to analyze SQL performance.
The document provides examples of HTML tags like <address>, <area>, <audio>, <blockquote>, <button>, and others. It shows how each tag is structured and used in a short code sample to define its purpose, like <address> for contact information or <audio> for embedding audio files.
Nesta sessão é objetivo mostrar as novas funcionalidade do HTML5, bem como a integração com tecnologias existentes.
Nesta sessão vão ser abordadas as diferenças existentes entre o HTML 4 e o HTML 5, vai ser possível perceber quais são as novas funcionalidades, novos controlos, integração com tecnologias existentes (CSS e Javascript). Vamos também discutir como fazer offline, ligações ao servidor para enviar ou receber informação e como utilizar o Canvas e o SVG para desenhar em HTML.
Comunidade NetPonto, a comunidade .NET em Portugal!
http://netponto.org
This document compares the performance of using XML-RPC versus Psycopg2 to access and update data in an OpenERP database. It describes programs written in Python using each method and measures the execution times. XML-RPC was slower, taking 3.27 seconds to run compared to 0.25 seconds for Psycopg2. Psycopg2 provides better performance by allowing direct SQL queries rather than going through the ORM. The document concludes that while XML-RPC provides security and compatibility with the OpenERP ORM, Psycopg2 is faster and allows standard SQL queries for better portability.
- The document discusses enhancements and new features in Cassandra 2.1 including user defined types, collection indexing, improved counters, data directory changes, bloom filter improvements, and more efficient repair. It also outlines the new query cache and row cache features in Cassandra.
Optimizing Slow Queries with Indexes and CreativityMongoDB
This document discusses optimizing slow queries in MongoDB through the use of indexes and schema design. It begins with examples of common performance issues like inefficient reads from table scans and writes causing locks. Each example shows the slow query, explains the problem, and proposes a solution like adding an index. It emphasizes that new indexes only scale up to a point and sometimes the best approach is to redesign the schema or add hardware. The talk provides guidance on measuring performance, finding slow queries, determining if they can be indexed, and rephrasing problems in terms of desired queries.
MongoDB.local Sydney 2019: Tips and Tricks for Avoiding Common Query PitfallsMongoDB
Query performance can either be a constant headache or the unsung hero of an application. MongoDB provides extremely powerful querying capabilities when used properly. As a member of the support team I will share common mistakes observed as well as tips and tricks to avoiding them.
MongoDB.local Seattle 2019: Tips & Tricks for Avoiding Common Query PitfallsMongoDB
Query performance can either be a constant headache or the unsung hero of an application. MongoDB provides extremely powerful querying capabilities when used properly. As a member of the support team I will share common mistakes observed as well as tips and tricks to avoiding them.
How to win $10m - analysing DOTA2 data in R (Sheffield R Users Group - May)Paul Richards
Presentation given by Chris Hopkinson at May Sheffield R Users Group meeting - how to (potentially) win $10m using association rules with data from the DOTA2 API
The document discusses Spring Data JPA and entity relationship mappings. It provides examples of mapping entities with relationships like OneToMany and ManyToOne using annotations. It also demonstrates various JPA operations like persisting, updating, deleting entities and querying relationships with examples of the generated SQL.
This document provides information about wild rice, including its history and cultivation. It discusses how wild rice was an important subsistence crop for Indigenous peoples of North America and how it has evolved into a luxury food item. Some key points:
- Wild rice grows naturally in shallow lakes and was a staple crop for Indigenous groups in the Great Lakes region.
- It was carefully managed through traditional ecological knowledge and is now an iconic part of the cultural heritage of that region.
- While once a subsistence food, wild rice is now a high-priced luxury item sold in specialty stores and markets due to its labor-intensive harvesting and processing.
- The author operates a family-run wild rice
This document discusses various DNN database tips and tricks presented by Will Strohl, including how to clear space by deleting old logs, change the dbo role owner when users cannot be created or dropped, change or replace themes by clearing default settings, and take over a site locally by changing the primary alias. The tips are demonstrated through SQL scripts that can automate common database tasks in DNN.
Database Development Replication Security Maintenance Reportnyin27
The document discusses various database administration tasks including:
1. Creating stored procedures, functions, views and indexes
2. Configuring security using roles, permissions and encryption
3. Implementing database maintenance including backups, jobs, partitioning and monitoring
4. Setting up reports and notifications
The document discusses best practices for locking down databases and applications in Microsoft SQL Server. It covers topics such as authentication, logins vs users, database roles, permissions, ownership chaining, auditing, and encryption. The author is a SQL Server MVP who provides recommendations based on their experience with security architecture, incident response, and SQL Server.
This document summarizes best practices for configuring and using MySQL. It discusses recommended configuration settings like using the InnoDB storage engine and strict SQL modes. It also covers topics like application user security through limited grants, logging and formatting SQL for analysis, and future-proofing SQL. The document recommends tools like the general query log to help developers analyze and optimize SQL performance.
This talk will be about managing DB scripts in our projects, from how to choose file structure to how easily manage them with large development team and run on different environments. We will look deep in the most popular tool for DB script migrations – Liquibase. How to write reliable scripts for Liquibase? How to run them everywhere? How to integrate them with Maven or Spring Boot? Answers for all these questions will be in this talk.
The document provides an overview of execution plans in SQL Server and what aspects to examine. It discusses the key stages in the execution process including parsing, optimization, and execution. Specific operators like nested loops, hash matches, and parallelism are also covered. The document is intended to help beginners understand execution plans and what aspects provide useful information for troubleshooting query performance issues.
The document provides information on various SQL commands used for data manipulation and control, database objects like tables and schemas, users and privileges in SQL. It discusses commands like COMMIT, ROLLBACK, GRANT, REVOKE used for transactions and managing privileges. It also summarizes creation, alteration and deletion of database objects using commands like CREATE, ALTER, DROP and functions like SELECT, INSERT, UPDATE, DELETE for data manipulation. The document further discusses concepts like stored procedures in SQL and use of phpMyAdmin for administering MySQL databases.
Replication with MySQL allows data changes on a master server to be replicated to slave servers. The master writes changes to its binary log which is used by slave servers to copy the changes and apply them to their own data. Replication can be used for scaling reads, data redundancy, analytics, and geographic distribution. It involves configuring servers, creating replication users, and starting the replication process on slaves. Filtering rules allow control over which databases, tables, or operations are replicated. Monitoring provides information on replication status, filters, binary logs, and any errors.
This document provides an overview of new features and enhancements in MySQL 8.0 over the last 18 months, from versions 8.0.23 to 8.0.30. It discusses improvements to replication, Group Replication, InnoDB, and primary keys. Some key changes include a new InnoDB redo log architecture, support for disabling the redo log at runtime, parallel index builds, and the ability to add an invisible auto-increment primary key column to tables without a primary key. The document is presented by Frédéric Descamps at the MySQL User Group NL.
The document discusses Oracle database memory management and configuration. It provides details on SGA components like db_cache_size, shared_pool_size, large_pool_size, java_pool_size and log_buffer. It also discusses PGA configuration using work_area_size_policy and pga_aggregate_target. Control file and redo log file management topics are covered along with relevant views. SQL commands to configure, monitor, backup and manage these components are also listed.
OSMC 2008 | Monitoring MySQL by Geert VanderkelenNETWAYS
Monitoring MySQL has a long history within Nagios. Several plugins are available already. In addition to that, there are probably lots of plugins that have been developed by the community. We take a look at some of these and discuss what kind of additional useful information could be pulled out of a MySQL Server for monitoring it even better. A simple example on how to write such plugins will be shown, also using NDB API for monitoring MySQL Cluster. Now that MySQL Enterprise Monitor (MEM) is available, we'll go through the possibilities for combining the two platforms. We will also discuss the NDOUtils for storing configuration and event data using MySQL.
This talk starts with a brief overview of MySQL itself: some history, where it's heading too, and why it is so successful.
This document provides an overview of SQL tuning concepts and tools in Oracle Database. It discusses the differences between database tuning and SQL tuning. It also covers diagnostic tools like SQL Trace, ASH, EXPLAIN PLAN, AUTOTRACE, and SQL Developer. Active monitoring tools like AWR, SQL Monitor and reactive tools like SQL Diagnostic Tool and SQLD360 are also mentioned. Additional topics include full table scans, adaptive features, statistics, hints, pending statistics, restoring statistics history, and invisible indexes.
This document contains definitions for several stored procedures in SQL including procedures for adding a primary key, analyzing duplicate records, bulk inserting data, logging events, processing phone numbers, and selecting employee and deduction records. The stored procedures define SQL queries and commands to perform operations like truncating tables, inserting records, and selecting records for output based on certain criteria.
The document discusses Django models and how they allow mapping database tables to Python objects. It explains how makemigrations and migrate commands are used to create database tables from models and evolve the schema. Models define the database schema, while migrations created from models handle applying the schema changes to databases like SQLite. The ORM allows interacting with data through Python objects instead of writing SQL directly.
Sql server ___________session_18(stored procedures)Ehtisham Ali
Stored procedures allow users to save and reuse SQL code. There are three types of stored procedures: user defined, extended, and system stored procedures. User defined stored procedures are custom procedures that perform repetitive tasks. Extended stored procedures allow SQL to interact with the operating system. System stored procedures are used to interact with system tables and are prefixed with "sp_". Stored procedures can take parameters, return results, and include logic like IF/ELSE statements. They improve code reuse and simplify tasks like accessing data across different queries or applications.
Structured Query Language (SQL) is a language used to manage data in relational database management systems. It allows users to query, manipulate, and define the structure of data. The document then provides instructions on downloading, installing, and testing MySQL, an open-source relational database management system, along with examples of basic and advanced SQL commands.
SQLAdria 2009 presentation's slides about our experience with Maven and SQLJ. It delves in some details about SQLJ and performance comparion between SQLJ and JDBC with prepared statements. It also shows surprising results for what concerns performances of (DB2) SQL PL procedures
DBA Brasil 1.0 - DBA Commands and Concepts That Every Developer Should KnowAlex Zaballa
This document summarizes a presentation on DBA commands and concepts that every developer should know. The presentation covers topics such as parallel processing, explain plans, flashback queries, pending statistics, virtual columns, and online table redefinition. It demonstrates several commands and concepts to help developers better understand database administration tasks.
DBA Brasil 1.0 - DBA Commands and Concepts That Every Developer Should KnowAlex Zaballa
This document summarizes a presentation on DBA commands and concepts that every developer should know. The presentation covers topics such as:
- Using SQLcl and DBMS_XPLAN to analyze query performance
- Leveraging parallelism to improve query performance
- Using Flashback Query and Flashback Table to view and recover past data
- Performing table recovery with RMAN
- Managing database schemas and statistics
- Implementing security with Virtual Private Database
DBA Brasil 1.0 - DBA Commands and Concepts That Every Developer Should KnowAlex Zaballa
This document summarizes a presentation on DBA commands and concepts that every developer should know. The presentation covers topics such as:
- Using SQLcl and tools like dbms_xplan to analyze queries and explain plans
- Leveraging parallelism to improve query performance
- Using flashback queries to view past data states
- Recovering dropped or corrupted tables using flashback and recycle bin features
- Migrating and restoring statistics to support testing and troubleshooting
The presentation provides examples and demonstrations of commands for tasks like analyzing queries, improving performance, recovering data, and managing database metadata.
Similar to Permissions script for SQL Permissions (20)
Session form series of conferences during Data Relay (formerly SQL Relay) 2018 in Newcastle, Leeds, Birmingham, Reading, Bristol. The session contains only slides form the talk (no videos included).
Slides from data MindsConnect 2018 Conference hosted at Ghelamnco Arena in Ghent by Belgian SQL Server USer Grup. SECDev(OPS) How to embrace your security.
Session from SQLDay 2016 Conference in Wroclaw.
2 AM. We're sleeping well and our mobile is ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talking about the potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Does virtual or physical SQL Server matter? We talk about systems, databases, people, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server environment are critical and how to be prepared for disaster. In some documents, I'll show You how to be BEST prepared.
Backup? Who cares! Now and Then? We store our data in the cloud. Somewhere in the Cloud. Which Cloud? Who cares! But we are still SQL Server Professionals, so… are we need backup? Should we use newest opportunities or old methods? Are we going a step further or step back? On my session, I will try to find answers for all of those (and more) questions. Demos, cases, and examples from the world of backup. And of course worst practices.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
On my first session I would to introduce everyone to formerly known SQL Azure (actually Windows Azure SQL Database). Under Tips and Trick session I will show which points, features, compatibility and non-compatibility for SQL Azure are important for DBA's. I will cover functionalities, performance, cost, and sla and security aspects.
After break I will show how we can work with our data in the Cloud using SQL Azure, Blob Storage, what functionality of backup, restore, encryption and availability are available for us, how we can implement hybrid environment and when an why it is (or not) good practice.
And finally I hope we will find few minutes for discussion about Future of the DBA (not only in AD 2016)
This document discusses best practices for preparing for and responding to a disaster involving critical IT systems like servers and databases. It emphasizes the importance of regular backups, having recovery procedures documented, testing restores, and defining roles and responsibilities of team members. It provides guidance on backup strategies for SQL Server and SharePoint, including using different types of backups, storing backups offline, and setting backup schedules. It also stresses the value of preparation, being ready to restore from backups, and having contact information and credentials documented in advance in case of an emergency.
Windows Azure SQL Database for Beginners (tips & tricks)
The document provides an overview and introduction to Windows Azure SQL Database including:
- Key features such as scalability, availability, data protection, and programmatic DBA functionality.
- Performance levels are described in DTU (database transaction units) with different tiers for Basic, Standard, and Premium databases.
- Limitations are discussed around database sizing, collations, logins/users, and compatibility with on-premises SQL Server features.
This document discusses SQL Server security enhancements in SQL Server 2014. It covers three main topics:
1) Transparent Data Encryption allows encrypting database and log files for protection both during operations and when backing up to disk or Azure. Encryption can use passwords, asymmetric keys, or certificates.
2) Encryption Key Management allows managing encryption keys through PowerShell, SMO, SSMS and T-SQL. Asymmetric keys or certificates used for encryption must be properly backed up.
3) A new "CONNECT ANY DATABASE" permission allows logins to connect to all current and future databases without other permissions in those databases. This facilitates auditing processes.
The document discusses SQL Server security in three parts. The first part provides an overview of security concepts and categories security into the IT, physical, and political realms. The second part outlines SQL Server security best practices such as using Windows authentication, securing administrator accounts, and limiting public permissions. The third part covers new security enhancements in SQL Server 2014 like transparent data encryption, encryption key management, and the CONNECT ANY DATABASE permission.
This document discusses SQL Server backup and recovery best practices. It begins with an introduction by Tobiasz Janusz Koprowski on his background and experience. The agenda then outlines parts on introduction to backup options, demonstrations of backup in the cloud and on-premise, and best practices. It covers topics like understanding different cloud service models, security requirements for Azure, and non-compatible features between SQL Server versions and SQL Azure. It also demonstrates connecting to and backing up databases in SQL Azure and on-premise SQL Server.
This document discusses SQL Server security and provides an overview of SQL Server security best practices and enhancements in SQL Server 2014. It covers categorizing security across IT, physical, political, and SQL Server realms. It outlines best practices for authentication, securing administrator accounts, complex passwords, specific logins, administrator membership, guest access, stored procedure permissions, ports, services, and encryption. New SQL Server 2014 features discussed include transparent data encryption, encryption key management, and new permissions for connecting to any database and impersonating logins.
This document provides an overview and agenda for a presentation on Windows Azure SQL Database for beginners. The presentation will cover topics in three parts: features and functionality of SQL Database in Azure in the first part, demonstrations of the Azure portal and management tools in the second part, and a discussion on the future of database administration in the third part. Additional links and a question/answer session will be provided in an appendix.
SQL Server Source Control for Beginners is a presentation about using source control for SQL Server databases. It discusses:
- Common source control systems like SVN, TFS, and Mercurial that can be used to track database changes.
- How RedGate SQL Source Control allows committing database objects and changes directly from SQL Server Management Studio.
- Key features like rolling back changes, maintaining referential integrity, and locking objects while working.
- Demonstrates setting up a database in source control and committing changes.
- Additional tools that can deploy databases directly from source control like SQL Compare and SQL Data Compare.
This document provides an overview and introduction to Windows Azure SQL Database. It discusses key topics such as:
- SQL Database service tiers including Basic, Standard, and Premium, which are differentiated by performance levels measured in Database Transaction Units (DTUs) and other features.
- Database size limits and performance metrics for each tier.
- Database replication and high availability capabilities to ensure reliability.
- Support for common SQL Server features while noting some limitations compared to on-premises SQL Server.
- Considerations for database naming, users/logins, migrations, and automation in the SQL Database platform.
- Indexing requirements and compatibility differences to be aware of.
Tobiasz Janusz Koprowski presents information on disaster preparedness and recovery best practices. The document discusses the importance of having backups, recovery procedures, clearly defined roles and responsibilities, service level agreements, and contact information in case of an outage. Specific recommendations include regularly testing restores, storing backup files offsite, having accurate documentation, and ensuring key personnel are prepared to respond to disasters and outages.
Maintenance plans provide a way to automate database maintenance tasks such as integrity checks, index maintenance, and backups. They can be created using the Maintenance Plan Wizard or Maintenance Plan Designer. Common tasks include checking database integrity with DBCC CHECKDB, reorganizing or rebuilding indexes, updating statistics, and performing full, differential or transaction log backups. Care must be taken to choose the right tasks and schedule to maintain performance and protect the database.
The document discusses best practices for preventing and recovering from disasters affecting IT systems. It emphasizes the importance of being prepared through regular backups, testing restores, clear documentation of backup and restore procedures, and defined roles and responsibilities. Key recommendations include performing backups to separate storage regularly; testing restores from backups; having a disaster recovery plan, procedures, and environment ready; and ensuring appropriate staff are assigned roles to respond to an outage. The overall message is that the best way to survive a disaster is through preparation, including backups, documentation, training and assigning roles.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
1. /*********** Permissions Script for WRON023KEYKO Login ##MS_PolicyEventProcessingLogin##
Generated 2011-10-16 16:22:45 ***************/
--Scripting Server Login (password is null) and Default Database
/* For security reasons the login is created disabled and with a random password. */
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name =
N'##MS_PolicyEventProcessingLogin##')
BEGIN
CREATE LOGIN [##MS_PolicyEventProcessingLogin##] WITH
PASSWORD=N'îK''îΓN_g“Â_!é@ôz«7_§Oæö½_VˬU#4', DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english], CHECK_EXPIRATION=OFF, CHECK_POLICY=ON
ALTER LOGIN [##MS_PolicyEventProcessingLogin##] DISABLE
END
--Scripting Server Roles
USE [master]
GO
--Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'##MS_PolicyEventProcessingLogin##')
CREATE USER [##MS_PolicyEventProcessingLogin##] FOR LOGIN
[##MS_PolicyEventProcessingLogin##] WITH DEFAULT_SCHEMA=[dbo]
--Scripting Object and Statement Permissions
USE [master]
GO
Grant CONNECT ON Database::[master] TO [##MS_PolicyEventProcessingLogin##]
GO
USE [master]
GO
Grant EXECUTE ON [sys].[sp_syspolicy_execute_policy] TO
[##MS_PolicyEventProcessingLogin##]
GO
USE [msdb]
GO
2. --Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'##MS_PolicyEventProcessingLogin##')
CREATE USER [##MS_PolicyEventProcessingLogin##] FOR LOGIN
[##MS_PolicyEventProcessingLogin##] WITH DEFAULT_SCHEMA=[dbo]
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'PolicyAdministratorRole' AND type = 'R')
CREATE ROLE [PolicyAdministratorRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_object_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_target_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_target_set_level] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
3. Grant EXECUTE ON [dbo].[sp_syspolicy_configure] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_create_purge_job] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_object_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_dispatch_event] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_detail] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_end] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_start] TO
[PolicyAdministratorRole]
GO
USE [msdb]
4. GO
Grant EXECUTE ON [dbo].[sp_syspolicy_purge_health_state] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_purge_history] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_repair_policy_automation] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_config_enabled] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_config_history_retention] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_log_on_success] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
5. Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_target_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_target_set_level] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_verify_object_set_identifiers] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_conditions] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_configuration] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_object_sets] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policies] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_categories] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_category_subscriptions] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
6. Grant SELECT ON [dbo].[syspolicy_policy_execution_history] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_execution_history_details] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_system_health_state] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_target_set_levels] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_target_sets] TO [PolicyAdministratorRole]
GO
--Scripting Database Role Members
USE [msdb]
GO
exec sp_addrolemember N'PolicyAdministratorRole', N'##MS_PolicyEventProcessingLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentOperatorRole'
AND type = 'R')
CREATE ROLE [SQLAgentOperatorRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_login_for_proxy] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_alert] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_notification] TO [SQLAgentOperatorRole]
GO
7. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_targetserver] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_purge_jobhistory] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysalerts] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysnotifications] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysoperators] TO [SQLAgentOperatorRole]
GO
exec sp_addrolemember N'SQLAgentOperatorRole', N'##MS_PolicyEventProcessingLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentReaderRole'
AND type = 'R')
CREATE ROLE [SQLAgentReaderRole] AUTHORIZATION [dbo]
exec sp_addrolemember N'SQLAgentReaderRole', N'##MS_PolicyEventProcessingLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentUserRole' AND
type = 'R')
CREATE ROLE [SQLAgentUserRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_job] TO [SQLAgentUserRole]
GO
8. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_addtask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_attach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobs] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobsteps] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobstep] TO [SQLAgentUserRole]
9. GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_detach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_droptask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_sqlagent_subsystems] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_job_alerts] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_jobstep_db_username] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_sqlagent_properties] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_category] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobactivity] TO [SQLAgentUserRole]
GO
USE [msdb]
10. GO
Grant EXECUTE ON [dbo].[sp_help_jobcount] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_full] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_sem] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_summary] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobs_in_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_proxy] TO [SQLAgentUserRole]
GO
11. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_maintplan_subplans_by_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_notify_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_start_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_stop_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_uniquetaskname] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syscategories] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
12. Grant SELECT ON [dbo].[sysjobs_view] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysschedules_localserver_view] TO [SQLAgentUserRole]
GO
exec sp_addrolemember N'SQLAgentUserRole', N'##MS_PolicyEventProcessingLogin##'
GO
--Scripting Object and Statement Permissions
USE [msdb]
GO
Grant CONNECT ON Database::[msdb] TO [##MS_PolicyEventProcessingLogin##]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_events_reader] TO [##MS_PolicyEventProcessingLogin##]
GO
/*********** Permissions Script for WRON023KEYKO Login ##MS_PolicyTsqlExecutionLogin##
Generated 2011-10-16 16:22:51 ***************/
--Scripting Server Login (password is null) and Default Database
/* For security reasons the login is created disabled and with a random password. */
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name =
N'##MS_PolicyTsqlExecutionLogin##')
BEGIN
CREATE LOGIN [##MS_PolicyTsqlExecutionLogin##] WITH PASSWORD=N'_á*³*óÎõÁ·¹%"_G)
“¹`&]ç(æØ]þX*0_', DEFAULT_DATABASE=[master], DEFAULT_LANGUAGE=[us_english],
CHECK_EXPIRATION=OFF, CHECK_POLICY=ON
ALTER LOGIN [##MS_PolicyTsqlExecutionLogin##] DISABLE
END
--Scripting Server Roles
USE [msdb]
GO
13. --Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'##MS_PolicyTsqlExecutionLogin##')
CREATE USER [##MS_PolicyTsqlExecutionLogin##] FOR LOGIN [##MS_PolicyTsqlExecutionLogin##]
WITH DEFAULT_SCHEMA=[dbo]
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'PolicyAdministratorRole' AND type = 'R')
CREATE ROLE [PolicyAdministratorRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_object_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_target_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_add_target_set_level] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
14. Grant EXECUTE ON [dbo].[sp_syspolicy_configure] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_create_purge_job] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_object_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_delete_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_dispatch_event] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_detail] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_end] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_log_policy_execution_start] TO
[PolicyAdministratorRole]
GO
USE [msdb]
15. GO
Grant EXECUTE ON [dbo].[sp_syspolicy_purge_health_state] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_purge_history] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_rename_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_repair_policy_automation] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_config_enabled] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_config_history_retention] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_set_log_on_success] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_condition] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
16. Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy_category] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_policy_category_subscription] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_target_set] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_update_target_set_level] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_syspolicy_verify_object_set_identifiers] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_conditions] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_configuration] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_object_sets] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policies] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_categories] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_category_subscriptions] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
17. Grant SELECT ON [dbo].[syspolicy_policy_execution_history] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_policy_execution_history_details] TO
[PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_system_health_state] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_target_set_levels] TO [PolicyAdministratorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syspolicy_target_sets] TO [PolicyAdministratorRole]
GO
--Scripting Database Role Members
USE [msdb]
GO
exec sp_addrolemember N'PolicyAdministratorRole', N'##MS_PolicyTsqlExecutionLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentOperatorRole'
AND type = 'R')
CREATE ROLE [SQLAgentOperatorRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_login_for_proxy] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_alert] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_notification] TO [SQLAgentOperatorRole]
GO
18. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_targetserver] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_purge_jobhistory] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysalerts] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysnotifications] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysoperators] TO [SQLAgentOperatorRole]
GO
exec sp_addrolemember N'SQLAgentOperatorRole', N'##MS_PolicyTsqlExecutionLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentReaderRole'
AND type = 'R')
CREATE ROLE [SQLAgentReaderRole] AUTHORIZATION [dbo]
exec sp_addrolemember N'SQLAgentReaderRole', N'##MS_PolicyTsqlExecutionLogin##'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentUserRole' AND
type = 'R')
CREATE ROLE [SQLAgentUserRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_job] TO [SQLAgentUserRole]
GO
19. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_addtask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_attach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobs] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobsteps] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobstep] TO [SQLAgentUserRole]
20. GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_detach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_droptask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_sqlagent_subsystems] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_job_alerts] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_jobstep_db_username] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_sqlagent_properties] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_category] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobactivity] TO [SQLAgentUserRole]
GO
USE [msdb]
21. GO
Grant EXECUTE ON [dbo].[sp_help_jobcount] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_full] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_sem] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_summary] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobs_in_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_proxy] TO [SQLAgentUserRole]
GO
22. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_maintplan_subplans_by_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_notify_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_start_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_stop_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_uniquetaskname] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syscategories] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
23. Grant SELECT ON [dbo].[sysjobs_view] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysschedules_localserver_view] TO [SQLAgentUserRole]
GO
exec sp_addrolemember N'SQLAgentUserRole', N'##MS_PolicyTsqlExecutionLogin##'
GO
--Scripting Object and Statement Permissions
USE [msdb]
GO
Grant CONNECT ON Database::[msdb] TO [##MS_PolicyTsqlExecutionLogin##]
GO
/*********** Permissions Script for WRON023KEYKO Login BUILTINUsers Generated 2011-10-16
16:22:53 ***************/
--Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'BUILTINUsers')
BEGIN
CREATE LOGIN [BUILTINUsers] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
/*********** Permissions Script for WRON023KEYKO Login NT AUTHORITYSYSTEM Generated
2011-10-16 16:22:55 ***************/
--Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'NT AUTHORITYSYSTEM')
BEGIN
24. CREATE LOGIN [NT AUTHORITYSYSTEM] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
exec sp_addsrvrolemember N'NT AUTHORITYSYSTEM', N'sysadmin'
GO
/*********** Permissions Script for WRON023KEYKO Login NT SERVICEMSSQL$KEYKO Generated
2011-10-16 16:22:57 ***************/
--Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'NT SERVICEMSSQL$KEYKO')
BEGIN
CREATE LOGIN [NT SERVICEMSSQL$KEYKO] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
exec sp_addsrvrolemember N'NT SERVICEMSSQL$KEYKO', N'sysadmin'
GO
/*********** Permissions Script for WRON023KEYKO Login sa Generated 2011-10-16 16:22:58
***************/
--Scripting Server Login (password is null) and Default Database
/* For security reasons the login is created disabled and with a random password. */
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'sa')
BEGIN
CREATE LOGIN [sa] WITH PASSWORD=N'¶“áqùm“G“·k“j_ÂÈò)[¤ã2
•ÉY_vY
%¹', DEFAULT_DATABASE=[master], DEFAULT_LANGUAGE=[us_english], CHECK_EXPIRATION=OFF,
CHECK_POLICY=ON
EXEC sys.sp_addsrvrolemember @loginame = N'sa', @rolename = N'sysadmin'
ALTER LOGIN [sa] DISABLE
END
--Scripting Server Roles
25. exec sp_addsrvrolemember N'sa', N'sysadmin'
GO
/*********** Permissions Script for WRON023KEYKO Login WRON023KoprowskiT Generated 2011-
10-16 16:23:00 ***************/
--Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'WRON023KoprowskiT')
BEGIN
CREATE LOGIN [WRON023KoprowskiT] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
exec sp_addsrvrolemember N'WRON023KoprowskiT', N'sysadmin'
GO
/*********** Permissions Script for WRON023KEYKO Login WRON023SQLSRVAdmin Generated
2011-10-16 16:23:02 ***************/
--Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name = N'WRON023SQLSRVAdmin')
BEGIN
CREATE LOGIN [WRON023SQLSRVAdmin] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
exec sp_addsrvrolemember N'WRON023SQLSRVAdmin', N'sysadmin'
GO
/*********** Permissions Script for WRON023KEYKO Login WRON023SQLSRVReporting Generated
2011-10-16 16:23:04 ***************/
26. --Scripting Server Login (password is null) and Default Database
IF NOT EXISTS (SELECT * FROM sys.server_principals WHERE name =
N'WRON023SQLSRVReporting')
BEGIN
CREATE LOGIN [WRON023SQLSRVReporting] FROM WINDOWS WITH DEFAULT_DATABASE=[master],
DEFAULT_LANGUAGE=[us_english]
END
--Scripting Server Roles
USE [master]
GO
--Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'WRON023SQLSRVReporting')
CREATE USER [WRON023SQLSRVReporting] FOR LOGIN [WRON023SQLSRVReporting] WITH
DEFAULT_SCHEMA=[WRON023SQLSRVReporting]
--Create Database Role
USE [master]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'RSExecRole' AND type =
'R')
CREATE ROLE [RSExecRole] AUTHORIZATION [dbo]
USE [master]
GO
Grant EXECUTE ON [sys].[xp_sqlagent_enum_jobs] TO [RSExecRole]
GO
USE [master]
GO
Grant EXECUTE ON [sys].[xp_sqlagent_is_starting] TO [RSExecRole]
GO
USE [master]
GO
Grant EXECUTE ON [sys].[xp_sqlagent_notify] TO [RSExecRole]
GO
--Scripting Database Role Members
USE [master]
GO
exec sp_addrolemember N'RSExecRole', N'WRON023SQLSRVReporting'
27. GO
--Scripting Object and Statement Permissions
USE [master]
GO
Grant CONNECT ON Database::[master] TO [WRON023SQLSRVReporting]
GO
USE [msdb]
GO
--Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'WRON023SQLSRVReporting')
CREATE USER [WRON023SQLSRVReporting] FOR LOGIN [WRON023SQLSRVReporting] WITH
DEFAULT_SCHEMA=[WRON023SQLSRVReporting]
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'RSExecRole' AND type =
'R')
CREATE ROLE [RSExecRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_category] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_job] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobschedule] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobserver] TO [RSExecRole]
GO
28. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobstep] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_job] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_category] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_job] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobschedule] TO [RSExecRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_verify_job_identifiers] TO [RSExecRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syscategories] TO [RSExecRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysjobs] TO [RSExecRole]
GO
--Scripting Database Role Members
USE [msdb]
GO
exec sp_addrolemember N'RSExecRole', N'WRON023SQLSRVReporting'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentOperatorRole'
AND type = 'R')
CREATE ROLE [SQLAgentOperatorRole] AUTHORIZATION [dbo]
29. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_login_for_proxy] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_alert] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_notification] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_targetserver] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_purge_jobhistory] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysalerts] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysnotifications] TO [SQLAgentOperatorRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysoperators] TO [SQLAgentOperatorRole]
GO
exec sp_addrolemember N'SQLAgentOperatorRole', N'WRON023SQLSRVReporting'
GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentReaderRole'
AND type = 'R')
CREATE ROLE [SQLAgentReaderRole] AUTHORIZATION [dbo]
exec sp_addrolemember N'SQLAgentReaderRole', N'WRON023SQLSRVReporting'
30. GO
--Create Database Role
USE [msdb]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'SQLAgentUserRole' AND
type = 'R')
CREATE ROLE [SQLAgentUserRole] AUTHORIZATION [dbo]
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_add_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_addtask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_attach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobs] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_check_for_owned_jobsteps] TO [SQLAgentUserRole]
GO
USE [msdb]
31. GO
Grant EXECUTE ON [dbo].[sp_delete_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_delete_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_detach_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_droptask] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_enum_sqlagent_subsystems] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_job_alerts] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_jobstep_db_username] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_get_sqlagent_properties] TO [SQLAgentUserRole]
GO
32. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_category] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobactivity] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobcount] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_full] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_sem] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobhistory_summary] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobs_in_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobschedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobserver] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
33. Grant EXECUTE ON [dbo].[sp_help_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_jobsteplog] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_proxy] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_help_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_maintplan_subplans_by_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_notify_operator] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_start_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_stop_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_uniquetaskname] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_job] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobschedule] TO [SQLAgentUserRole]
GO
34. USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_jobstep] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant EXECUTE ON [dbo].[sp_update_schedule] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[syscategories] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysjobs_view] TO [SQLAgentUserRole]
GO
USE [msdb]
GO
Grant SELECT ON [dbo].[sysschedules_localserver_view] TO [SQLAgentUserRole]
GO
exec sp_addrolemember N'SQLAgentUserRole', N'WRON023SQLSRVReporting'
GO
--Scripting Object and Statement Permissions
USE [msdb]
GO
Grant CONNECT ON Database::[msdb] TO [WRON023SQLSRVReporting]
GO
USE [ReportServer$KEYKO]
GO
--Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'WRON023SQLSRVReporting')
CREATE USER [WRON023SQLSRVReporting] FOR LOGIN [WRON023SQLSRVReporting] WITH
DEFAULT_SCHEMA=[WRON023SQLSRVReporting]
--Scripting Database Role Members
35. USE [ReportServer$KEYKO]
GO
exec sp_addrolemember N'db_owner', N'WRON023SQLSRVReporting'
GO
--Create Database Role
USE [ReportServer$KEYKO]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'RSExecRole' AND type =
'R')
CREATE ROLE [RSExecRole] AUTHORIZATION [dbo]
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ActiveSubscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ActiveSubscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ActiveSubscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ActiveSubscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ActiveSubscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddBatchRecord] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddDataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddEvent] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
36. GO
Grant EXECUTE ON [dbo].[AddExecutionLogEntry] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddHistoryRecord] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddPersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddReportToCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddRunningJob] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AddSubscriptionToBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[AnnounceOrGetKey] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Batch] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Batch] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Batch] TO [RSExecRole]
GO
37. USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Batch] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Batch] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[CachePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[CachePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[CachePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[CachePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[CachePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Catalog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Catalog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Catalog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Catalog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
38. Grant UPDATE ON [dbo].[Catalog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ChangeStateOfDataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CheckSessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
39. USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanAllHistories] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanBatchRecords] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanBrokenSnapshots] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanEventRecords] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanExpiredCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanExpiredJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanExpiredServerParameters] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanExpiredSessions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanHistoryForReport] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanNotificationRecords] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanOrphanedPolicies] TO [RSExecRole]
40. GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CleanOrphanedSnapshots] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ClearScheduleConsistancyFlags] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ClearSessionSnapshot] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CopyChunks] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CopyChunksOfType] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateCacheUpdateNotifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
41. GO
Grant EXECUTE ON [dbo].[CreateChunkAndGetPointer] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateChunkSegment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateDataDrivenNotification] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateNewActiveSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateNewSnapshotVersion] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateObject] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateRdlChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateSegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateSession] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateSnapShotNotifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateSubscription] TO [RSExecRole]
GO
42. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateTask] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateTimeBasedSubscriptionNotification] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[CreateTimeBasedSubscriptionSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[DataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[DataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[DataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[DataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[DataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DecreaseTransientSnapshotRefcount] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeepCopySegment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteActiveSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
43. Grant EXECUTE ON [dbo].[DeleteAllHistoryForReport] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteAllModelItemPolicies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteBatchRecords] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteDataSources] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteDrillthroughReports] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteEncryptedContent] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteEvent] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteExpiredPersistedStreams] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteHistoriesWithNoPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteHistoryRecord] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteKey] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteModelItemPolicy] TO [RSExecRole]
GO
44. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteModelPerspectives] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteNotification] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteObject] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteOneChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeletePersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeletePersistedStreams] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeletePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteSnapshotAndChunks] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteTask] TO [RSExecRole]
45. GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeleteTimeBasedSubscriptionSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DeliveryRemovedInactivateSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[DereferenceSessionSnapshot] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Event] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Event] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Event] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Event] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Event] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ExecutionLog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ExecutionLog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ExecutionLog_Old] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
46. GO
Grant INSERT ON [dbo].[ExecutionLog_Old] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ExecutionLog_Old] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ExecutionLog_Old] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ExecutionLog_Old] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ExecutionLog2] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ExecutionLog2] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ExecutionLogStorage] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ExecutionLogStorage] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ExecutionLogStorage] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ExecutionLogStorage] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ExecutionLogStorage] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ExpireExecutionLogEntries] TO [RSExecRole]
GO
47. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FindItemsByDataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FindObjectsByLink] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FindObjectsNonRecursive] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FindObjectsRecursive] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FindParents] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[FlushReportFromCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[Get_sqlagent_job_status] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetAllConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetAllProperties] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetAnnouncedKey] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetAReportsReportAction] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
48. Grant EXECUTE ON [dbo].[GetBatchRecords] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetCacheOptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetCacheSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetChildrenBeforeDelete] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetChunkInformation] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetChunkPointerAndLength] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetCompiledDefinition] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDataSourceForUpgrade] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDatasourceInfoForReencryption] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDataSources] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDBVersion] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDrillthroughReport] TO [RSExecRole]
GO
49. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetDrillthroughReports] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetExecutionOptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetFirstPortionPersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetIDPairsByLink] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetModelDefinition] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetModelItemInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetModelPerspectives] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetModelsAndPerspectives] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetMyRunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetNameById] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetNextPortionPersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetObjectContent] TO [RSExecRole]
50. GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetOneConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetParameters] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetPoliciesForRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetPolicyRoots] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetPrincipalID] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetReportForExecution] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetReportParametersForExecution] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetRoles] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSchedulesReports] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetServerParameters] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
51. GO
Grant EXECUTE ON [dbo].[GetSessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSnapshotChunks] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSnapshotFromHistory] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSnapshotPromotedInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSnapShotSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSubscriptionInfoForReencryption] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSubscriptionsForUpgrade] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetSystemPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetTaskProperties] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetTimeBasedSubscriptionReportAction] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetTimeBasedSubscriptionSchedule] TO [RSExecRole]
GO
52. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetUpgradeItems] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetUserID] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetUserIDByName] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[GetUserIDBySid] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[History] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[History] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[History] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[History] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[History] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[IncreaseTransientSnapshotRefcount] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[InsertUnreferencedSnapshot] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
53. Grant EXECUTE ON [dbo].[InvalidateSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[IsSegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Keys] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Keys] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Keys] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Keys] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Keys] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListHistory] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListInfoForReencryption] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListInstallations] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListRunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListScheduledReports] TO [RSExecRole]
GO
54. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListSubscriptionIDs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListSubscriptionsUsingDataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListTasks] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListTasksForMaintenance] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ListUsedDeliveryProviders] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[LoadForDefinitionCheck] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[LoadForRepublishing] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[LockPersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[LockSnapshotForUpgrade] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[MarkSnapshotAsDependentOnUser] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[MigrateExecutionLog] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ModelDrill] TO [RSExecRole]
55. GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ModelDrill] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ModelDrill] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ModelDrill] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ModelDrill] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ModelPerspective] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[MoveObject] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Notifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
56. GO
Grant INSERT ON [dbo].[Notifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Notifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Notifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Notifications] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ObjectExists] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[OpenSegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Policies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Policies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Policies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Policies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Policies] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[PolicyUserRole] TO [RSExecRole]
GO
57. USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[PolicyUserRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[PolicyUserRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[PolicyUserRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[PolicyUserRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[PromoteSnapshotInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ReadChunkPortion] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ReadChunkSegment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ReadRoleProperties] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[RebindDataSource] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[RemoveReportFromSession] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[RemoveRunningJob] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
58. Grant EXECUTE ON [dbo].[RemoveSegment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[RemoveSegmentedMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[RemoveSubscriptionFromBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[ReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[ReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[ReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[ReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[ReportSchedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Roles] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Roles] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Roles] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Roles] TO [RSExecRole]
GO
59. USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Roles] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[RunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[RunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[RunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[RunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[RunningJobs] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Schedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Schedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Schedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Schedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Schedule] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[SecData] TO [RSExecRole]
60. GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[SecData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[SecData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[SecData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[SecData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
61. GO
Grant REFERENCES ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetAllProperties] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetCacheOptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetConfigurationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetDrillthroughReports] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetExecutionOptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetHistoryLimit] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetKeysForInstallation] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetLastModified] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetMachineName] TO [RSExecRole]
GO
62. USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetModelItemPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetNotificationAttempt] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetObjectContent] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetParameters] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetPersistedStreamError] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetReencryptedDatasourceInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetReencryptedSubscriptionInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetRoleProperties] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetSessionCredentials] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetSessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
63. Grant EXECUTE ON [dbo].[SetSessionParameters] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetSnapshotChunksVersion] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetSnapshotProcessingFlags] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetSystemPolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[SetUpgradeItemStatus] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[ShallowCopyChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[StoreServerParameters] TO [RSExecRole]
GO
64. USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[Subscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Subscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Subscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Subscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Subscriptions] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant DELETE ON [dbo].[SubscriptionsBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[SubscriptionsBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[SubscriptionsBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[SubscriptionsBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[SubscriptionsBeingDeleted] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[TempChunkExists] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateActiveSubscription] TO [RSExecRole]
65. GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdatePolicy] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdatePolicyPrincipal] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdatePolicyRole] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateRunningJob] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateScheduleNextRunTime] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateSnapshot] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateSnapshotPaginationInfo] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateSnapshotReferences] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateSubscription] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateSubscriptionStatus] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[UpdateTask] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
66. GO
Grant DELETE ON [dbo].[Users] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant INSERT ON [dbo].[Users] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant REFERENCES ON [dbo].[Users] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant SELECT ON [dbo].[Users] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant UPDATE ON [dbo].[Users] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[WriteChunkPortion] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[WriteChunkSegment] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[WriteFirstPortionPersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[WriteLockSession] TO [RSExecRole]
GO
USE [ReportServer$KEYKO]
GO
Grant EXECUTE ON [dbo].[WriteNextPortionPersistedStream] TO [RSExecRole]
GO
exec sp_addrolemember N'RSExecRole', N'WRON023SQLSRVReporting'
GO
--Scripting Object and Statement Permissions
67. USE [ReportServer$KEYKO]
GO
Grant CONNECT ON Database::[ReportServer$KEYKO] TO [WRON023SQLSRVReporting]
GO
USE [ReportServer$KEYKOTempDB]
GO
--Grant Database Access
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name =
N'WRON023SQLSRVReporting')
CREATE USER [WRON023SQLSRVReporting] FOR LOGIN [WRON023SQLSRVReporting] WITH
DEFAULT_SCHEMA=[WRON023SQLSRVReporting]
--Scripting Database Role Members
USE [ReportServer$KEYKOTempDB]
GO
exec sp_addrolemember N'db_owner', N'WRON023SQLSRVReporting'
GO
--Create Database Role
USE [ReportServer$KEYKOTempDB]
GO
IF NOT EXISTS (SELECT * FROM sys.database_principals WHERE name = N'RSExecRole' AND type =
'R')
CREATE ROLE [RSExecRole] AUTHORIZATION [dbo]
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
68. Grant SELECT ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[ChunkData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[ChunkSegmentMapping] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[ExecutionCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[ExecutionCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[ExecutionCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[ExecutionCache] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[ExecutionCache] TO [RSExecRole]
GO
69. USE [ReportServer$KEYKOTempDB]
GO
Grant EXECUTE ON [dbo].[GetDBVersion] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[PersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[PersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[PersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[PersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[PersistedStream] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[Segment] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[SegmentedChunk] TO [RSExecRole]
70. GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[SegmentedChunk] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[SessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[SessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[SessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[SessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[SessionData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[SessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[SessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
71. GO
Grant REFERENCES ON [dbo].[SessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[SessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[SessionLock] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant DELETE ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant INSERT ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant REFERENCES ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant SELECT ON [dbo].[SnapshotData] TO [RSExecRole]
GO
USE [ReportServer$KEYKOTempDB]
GO
Grant UPDATE ON [dbo].[SnapshotData] TO [RSExecRole]
GO
exec sp_addrolemember N'RSExecRole', N'WRON023SQLSRVReporting'
GO
--Scripting Object and Statement Permissions
USE [ReportServer$KEYKOTempDB]
GO
Grant CONNECT ON Database::[ReportServer$KEYKOTempDB] TO [WRON023SQLSRVReporting]
GO
72. /*** WARNING: SQLpermssions is freeware - use it at your own risk. ***/
/*** There are potential security issues with copying logins and permissions ***/
/*** from one SQL Server to another. By using SQLpermissions, you acknowledge ***/
/*** and knowingly accept these risks. It is recommended that users take steps ***/
/*** to thoroughly evaluate the necessity of replicating logins and permissions ***/
/*** before using this tool. Idera shall not be liable for any damages you may ***/
/*** sustain by using this tool, whether direct, indirect, special, incidental ***/
/*** or consequential, even if it has been advised of the possibility of such damages.***/