Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, March 26, 2012

LinkedServer and pass through kind of security

Hi,

I am not expert on SQL server, i need to be able to access different server from withing sproc,

1. Is Linked Server is the best aproach.

2. If yes then how i set it up that it take all authenticated users of this server to remote, i tried with impersonate but it gives error that NT authority dont hae access etc etc (when i try run a sql that accesses remote server)

3. The reason i need to access remote server is ... one of the that table in my db (logTable) is getting to big it is 10 times the size of rest of the db altogether so i though i move it out not just from same db actully put it on a seprate server. so that all the tasks about main db would become easy etc.

any idea help

Sajjad

1. Read about distributed queries here.

2. The articles on Books Online provide examples. If you get stuck, post the statements you tried and any errors you encountered.

3. Depending on the queries you make on that table, moving it to another server might not be the best approach.

Thanks
Laurentiu

Friday, March 23, 2012

servers with Security Account Delegation

Can someone please give me step by step instructions for
setting up two SQL servers to use security account
delegation. Please leave out nothing. I've been working
on this for a week and still get "Error 18456: Login
failed for user 'NT AUTHORITY\ANONYMOUS LOGON'." I've
setup SPN for both SQL accounts (i.e. setspn -A
MSSQLSvc/SQLServer.domain.com:1433 SQLserviceaccount).
One thing I'm not entirely clear on is what should I have
on the delegation tabs for the service account and the
computer accounts. Please also let me know about aby
gotchas I may have overlooked.
I'm running a Windows 2003 domain (Forest and domain are
2003)
Any help would be greatly appreciated. ThanksI see some gotchas here --
http://msdn.microsoft.com/library/d...>
ity_2gmm.asp
Seeing this, you might want to check the Windows user account and make sure
Account is sensitive and cannot be delegated. Also, you might want to head
over to Services in Administrative Tools, and make sure MSSQLServer is set
to a domain user account to run under. That account must have Account is
trusted for delegation according to that article. I'm not sure what elevated
privleges for Local System is.
****************************************
***************************
Andy S.
MCSE NT/2000, MCDBA SQL 7/2000
andymcdba1@.NOMORESPAM.yahoo.com
Please remove NOMORESPAM before replying.
Always keep your antivirus and Microsoft software
up to date with the latest definitions and product updates.
Be suspicious of every email attachment, I will never send
or post anything other than the text of a http:// link nor
post the link directly to a file for downloading.
This posting is provided "as is" with no warranties
and confers no rights.
****************************************
***************************
"User needing help" <anonymous@.discussions.microsoft.com> wrote in message
news:12df201c3f6fd$4a694e80$a001280a@.phx
.gbl...
> Can someone please give me step by step instructions for
> setting up two SQL servers to use security account
> delegation. Please leave out nothing. I've been working
> on this for a week and still get "Error 18456: Login
> failed for user 'NT AUTHORITY\ANONYMOUS LOGON'." I've
> setup SPN for both SQL accounts (i.e. setspn -A
> MSSQLSvc/SQLServer.domain.com:1433 SQLserviceaccount).
> One thing I'm not entirely clear on is what should I have
> on the delegation tabs for the service account and the
> computer accounts. Please also let me know about aby
> gotchas I may have overlooked.
> I'm running a Windows 2003 domain (Forest and domain are
> 2003)
> Any help would be greatly appreciated. Thanks|||Please check the following configuration steps
1. User trying to connect to SQL Server is not sensitive and can be
delegated (By default all users are not sensitive, so you do not need to set
anything).
2. MDAC version on the client machine should be 2.6 or more.
3. You should setup SPNs for both the SQL Servers.
4. Use sp_addlinkedsrvlogin on the first linked server to impersonate the
clients.
5. Check whether the Service account of the first SQL Server is trusted for
delegation to the Linked Server service. Since your domain is rised to 2003
level, you can use Constrained delegation. If you have the SPN setup for the
account, then you will see a delegation tab in the user account properties
in AD. To start with, set "Trusted for delegation" to all servers and then
tighten it using constrained delegation.
If you configure above steps, you should be fine. If you still face problems
then, check whether Kerberos protocol is woking on both the hops
independently. If you can use Kerberos protocol, then the problem is with
delegation. Then check whether first SQL Server is configured to impersonate
the clients and then check the delegation attributes in AD.
Thanks,
Bala Neerumalla.
This posting is provided "AS IS" with no warranties, and confers no
rights.
"User needing help" <anonymous@.discussions.microsoft.com> wrote in message
news:12df201c3f6fd$4a694e80$a001280a@.phx
.gbl...
> Can someone please give me step by step instructions for
> setting up two SQL servers to use security account
> delegation. Please leave out nothing. I've been working
> on this for a week and still get "Error 18456: Login
> failed for user 'NT AUTHORITY\ANONYMOUS LOGON'." I've
> setup SPN for both SQL accounts (i.e. setspn -A
> MSSQLSvc/SQLServer.domain.com:1433 SQLserviceaccount).
> One thing I'm not entirely clear on is what should I have
> on the delegation tabs for the service account and the
> computer accounts. Please also let me know about aby
> gotchas I may have overlooked.
> I'm running a Windows 2003 domain (Forest and domain are
> 2003)
> Any help would be greatly appreciated. Thanks|||One thing people often get confused on is that the SQL Server SPN has to
belong to the account used to start SQL Server, not to the machine name
(unless SQL Server is started as local system).
There are some good tips in this article:
811889 HOW TO: Troubleshoot the "Cannot Generate SSPI Context" Error Message
http://support.microsoft.com/?id=811889
Cindy Gross, MCDBA, MCSE
http://cindygross.tripod.com
This posting is provided "AS IS" with no warranties, and confers no rights.

servers using SQL Server Authentication

I am new to dealing with SQL Server permissions and security, so
hopefully the solution to my problem is straightforward. I have two SQL
Server 2005 Express databases that I want to link via SQL Server
Authentication (I cannot use Windows Authentication). The servers need
to be linked up initially via stored procedures (which will be called
via a VB.Net app). There is a security warning in BOL for
sp_addlinkedsrvlogin that says"
"This example does not use Windows Authentication. Passwords will be
transmitted unencrypted. Passwords may be visible in data source
definitions and scripts that are saved to disk, in backups, and in log
files. Never use an administrator password in this kind of connection.
Consult your network administrator for security guidance specific to
your environment."
Thus, I do not want to link the servers using the 'sa' password, and
instead have created a limited privledge user (called 'junk' for now)
and assigned it the to the roles that I need: db_reader, db_writer,
db_ddladmin (some of the stored procs that this user will call need to
alter tables), and setupadmin (to allow linking a server).
So logged in as the user 'junk', the first step is actually linking the
servers:
exec master.dbo.sp_addlinkedserver @.server =
N'192.168.1.124\SQLEXPRESS', @.srvproduct=N'SQL Server'
Then I need to map the logins with the other server, which also has the
same user 'junk' with the same permissions:
exec master.dbo.sp_addlinkedsrvlogin
'192.168.1. 124\SQLEXPRESS','FALSE','junk','junk','m
yPassword'
However, when I attempt to execute this, I get the error:
"User does not have permission to perform this action".
BOL says that the permissions required for sp_addlinkedsrvlogin are
"ALTER ANY LOGIN". I'm not entirely sure what this means, but in any
case I execute GRANT on this user:
GRANT ALTER ANY LOGIN on junk
Now sp_addlinkedsrvlogin above works. Is this the only way I can link
servers using this limited priviledge account? It seems to me that I am
I opening up a security vulnerability if someone sniffs the junk
password and then can "ALTER ANY LOGIN" using this account. Is there
another way? Perhaps I could briefly GRANT the "alter any login", link
the server, and the revoke the priviledge.
Thanks for any comments,
MarcusHi
The security warning relates to the usage and presence of the linked server
and not the creation.
If you are not creating the linked server within your application then your
"junk" user does not need the extra permissions. Create the linked server an
d
logins as an administrator.
John
"Marcus" wrote:

> I am new to dealing with SQL Server permissions and security, so
> hopefully the solution to my problem is straightforward. I have two SQL
> Server 2005 Express databases that I want to link via SQL Server
> Authentication (I cannot use Windows Authentication). The servers need
> to be linked up initially via stored procedures (which will be called
> via a VB.Net app). There is a security warning in BOL for
> sp_addlinkedsrvlogin that says"
> "This example does not use Windows Authentication. Passwords will be
> transmitted unencrypted. Passwords may be visible in data source
> definitions and scripts that are saved to disk, in backups, and in log
> files. Never use an administrator password in this kind of connection.
> Consult your network administrator for security guidance specific to
> your environment."
> Thus, I do not want to link the servers using the 'sa' password, and
> instead have created a limited privledge user (called 'junk' for now)
> and assigned it the to the roles that I need: db_reader, db_writer,
> db_ddladmin (some of the stored procs that this user will call need to
> alter tables), and setupadmin (to allow linking a server).
> So logged in as the user 'junk', the first step is actually linking the
> servers:
> exec master.dbo.sp_addlinkedserver @.server =
> N'192.168.1.124\SQLEXPRESS', @.srvproduct=N'SQL Server'
> Then I need to map the logins with the other server, which also has the
> same user 'junk' with the same permissions:
> exec master.dbo.sp_addlinkedsrvlogin
> '192.168.1. 124\SQLEXPRESS','FALSE','junk','junk','m
yPassword'
> However, when I attempt to execute this, I get the error:
> "User does not have permission to perform this action".
> BOL says that the permissions required for sp_addlinkedsrvlogin are
> "ALTER ANY LOGIN". I'm not entirely sure what this means, but in any
> case I execute GRANT on this user:
> GRANT ALTER ANY LOGIN on junk
> Now sp_addlinkedsrvlogin above works. Is this the only way I can link
> servers using this limited priviledge account? It seems to me that I am
> I opening up a security vulnerability if someone sniffs the junk
> password and then can "ALTER ANY LOGIN" using this account. Is there
> another way? Perhaps I could briefly GRANT the "alter any login", link
> the server, and the revoke the priviledge.
> Thanks for any comments,
> Marcus
>|||Thanks for your reply, John. Actually, the linking of the servers DOES
need to happen in the application (VB.Net), and thus I do want the user
'junk' to be able to set up the linked server. It is reasonable do you
think to momentarily give it permissions for "GRANT ALTER ANY LOGIN",
and then once the servers are linked to revoke that priviledge?
Thanks,
Marcus
P.S. What do you think of the permissions I have assigned to this user?
It needs to read from and write to tables, perform ALTER table, and run
some stopred procedures and functions. It is currently assigned to
these roles:
- db_reader
- db_writer
- db_ddladmin (for performing ALTER)
- setupadmin (for linking the server)
Have I given it too much?
Cheers,
M.
The user needs|||Hi Marcus
The best method of keeping the application secure it to avoid creating the
link server in the application. It is not clear why this has to be so dynami
c
and can not be part of an installation (or restricted) process. Giving the
user database roles will be less secure than granting specific privileges to
given tables or it would be even better to restrict access though stored
procedures.
John
"Marcus" wrote:

> Thanks for your reply, John. Actually, the linking of the servers DOES
> need to happen in the application (VB.Net), and thus I do want the user
> 'junk' to be able to set up the linked server. It is reasonable do you
> think to momentarily give it permissions for "GRANT ALTER ANY LOGIN",
> and then once the servers are linked to revoke that priviledge?
> Thanks,
> Marcus
> P.S. What do you think of the permissions I have assigned to this user?
> It needs to read from and write to tables, perform ALTER table, and run
> some stopred procedures and functions. It is currently assigned to
> these roles:
> - db_reader
> - db_writer
> - db_ddladmin (for performing ALTER)
> - setupadmin (for linking the server)
> Have I given it too much?
> Cheers,
> M.
>
> The user needs
>|||Thanks for your comments, John. The user of the application will need
to specify what server to link to over TCP/IP (no windows
authentication possible). Thus, it seems that the application needs to
call the following 2 stored procedures:
- sp_addlinkedserverexec
- sp_addlinkedsrvlogin
For the procedure "sp_addlinkedsrvlogin" it requires a username and
password. As windows authentication is not possible, I need to use sql
server authentication which will send the user name and password in
clear text. I thus don't want to use and powerful account like 'sa' as
it might be sniffed. I am still not clear of any other way to do this
via ado.net on the server EXCEPT...
... I have just learned about SQL-DMO. I think this may solve my
problem as I can take care of linking the servers and creating users,
assigning permissions using this object. It also provides a bunch of
other functionality that I think will be helpful, like being able to
iterate through all the other SQL Servers on the network.
Yes, I agree that ultimately I will need to restrict access to the
database except through stored procedures or views. Currently there is
a legacy application that is hitting each table directly.
Cheers,
Marcus|||Hi Marcus
It is still not clear why this is not in a setup program. If you don't need
to do this functionality more than one then take it out of the main program
and put it into a program where they can use a different account to set it
up. This will be more secure. The login passed to sp_addlinkedsrvlogin does
not have to be the same as the current login.
John
"Marcus" wrote:

> Thanks for your comments, John. The user of the application will need
> to specify what server to link to over TCP/IP (no windows
> authentication possible). Thus, it seems that the application needs to
> call the following 2 stored procedures:
> - sp_addlinkedserverexec
> - sp_addlinkedsrvlogin
> For the procedure "sp_addlinkedsrvlogin" it requires a username and
> password. As windows authentication is not possible, I need to use sql
> server authentication which will send the user name and password in
> clear text. I thus don't want to use and powerful account like 'sa' as
> it might be sniffed. I am still not clear of any other way to do this
> via ado.net on the server EXCEPT...
> ... I have just learned about SQL-DMO. I think this may solve my
> problem as I can take care of linking the servers and creating users,
> assigning permissions using this object. It also provides a bunch of
> other functionality that I think will be helpful, like being able to
> iterate through all the other SQL Servers on the network.
> Yes, I agree that ultimately I will need to restrict access to the
> database except through stored procedures or views. Currently there is
> a legacy application that is hitting each table directly.
> Cheers,
> Marcus
>|||Hi, John. In my scenario, the user is permitted to link up different
servers at runtime. I think I need to rethink my security here. It
would like be better to use something along the lines of your
suggestion. Thanks for you help.
Marcus

Wednesday, March 21, 2012

servers in 2005

Hi,
I just can't found the Linked Servers under Security in SQL Server 2005 EE.
Can someone get me some help?
Regards,
-ChenServer Objects folder.
Ben Nevarez, MCDBA, OCP
Database Administrator
"Chen" wrote:
> Hi,
> I just can't found the Linked Servers under Security in SQL Server 2005 EE.
> Can someone get me some help?
> Regards,
> -Chen

servers in 2005

Hi,
I just can't found the Linked Servers under Security in SQL Server 2005 EE.
Can someone get me some help?
Regards,
-Chen
Server Objects folder.
Ben Nevarez, MCDBA, OCP
Database Administrator
"Chen" wrote:

> Hi,
> I just can't found the Linked Servers under Security in SQL Server 2005 EE.
> Can someone get me some help?
> Regards,
> -Chen
sql

servers in 2005

Hi,
I just can't found the Linked Servers under Security in SQL Server 2005 EE.
Can someone get me some help?
Regards,
-ChenServer Objects folder.
Ben Nevarez, MCDBA, OCP
Database Administrator
"Chen" wrote:

> Hi,
> I just can't found the Linked Servers under Security in SQL Server 2005 EE
.
> Can someone get me some help?
> Regards,
> -Chen

servers and windows authentication

Hi,
Does anybody know if I can use linked server security
configuration with login's current security context for
windows authenticated sql server logins? I tested and it
doesn't work!!!
I have same windows nt sql server logins on both servers.
Linked server security is configured in a way that all
connections should be made using the login's current
security context (third option). It means that all windows
nt users should be able to refer database objects from the
linked server in their queries (using fully qualified
object name).
Well..., it is not true!
It works ONLY if windows nt user is connected locally to
the server where linked server is defined! However, if the
same windows nt user tries to do that from the client
computer, query fails with login incorrect message.
Did anybody try this? It's so stupid that I cannot believe
it's true.
ThanksHere is the other article I meant to paste in:
http://www.winnetmag.com/SQLServer/Article/ArticleID/23670/23670.html
--
----
----
--
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks|||I believe that problem is known as the "Double Hop" problem. There is some
information at the bottom of this page the explains:
http://support.microsoft.com/default.aspx?scid=kb;en-us;238477&Product=sql
Also you might consider looking at this one:
----
----
--
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks

servers and windows authentication

Hi,
Does anybody know if I can use linked server security
configuration with login's current security context for
windows authenticated sql server logins? I tested and it
doesn't work!!!
I have same windows nt sql server logins on both servers.
Linked server security is configured in a way that all
connections should be made using the login's current
security context (third option). It means that all windows
nt users should be able to refer database objects from the
linked server in their queries (using fully qualified
object name).
Well..., it is not true!
It works ONLY if windows nt user is connected locally to
the server where linked server is defined! However, if the
same windows nt user tries to do that from the client
computer, query fails with login incorrect message.
Did anybody try this? It's so stupid that I cannot believe
it's true.
Thanks
I believe that problem is known as the "Double Hop" problem. There is some
information at the bottom of this page the explains:
http://support.microsoft.com/default...77&Product=sql
Also you might consider looking at this one:
----
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks
|||I believe that problem is known as the "Double Hop" problem. There is some
information at the bottom of this page the explains:
http://support.microsoft.com/default...77&Product=sql
Also you might consider looking at this one:
----
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks
|||Here is the other article I meant to paste in:
http://www.winnetmag.com/SQLServer/A...670/23670.html
----
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks
|||Here is the other article I meant to paste in:
http://www.winnetmag.com/SQLServer/A...670/23670.html
----
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks

servers and windows authentication

Hi,
Does anybody know if I can use linked server security
configuration with login's current security context for
windows authenticated sql server logins? I tested and it
doesn't work!!!
I have same windows nt sql server logins on both servers.
Linked server security is configured in a way that all
connections should be made using the login's current
security context (third option). It means that all windows
nt users should be able to refer database objects from the
linked server in their queries (using fully qualified
object name).
Well..., it is not true!
It works ONLY if windows nt user is connected locally to
the server where linked server is defined! However, if the
same windows nt user tries to do that from the client
computer, query fails with login incorrect message.
Did anybody try this? It's so stupid that I cannot believe
it's true.
ThanksI believe that problem is known as the "Double Hop" problem. There is some
information at the bottom of this page the explains:
http://support.microsoft.com/defaul...477&Product=sql
Also you might consider looking at this one:
----
----
--
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx
.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thanks|||Here is the other article I meant to paste in:
http://www.winnetmag.com/SQLServer/...3670/23670.html
----
----
--
Need SQL Server Examples check out my website at
http://www.geocities.com/sqlserverexamples
"OJ" <anonymous@.discussions.microsoft.com> wrote in message
news:228da01c45d51$a58a3990$a401280a@.phx
.gbl...
> Hi,
> Does anybody know if I can use linked server security
> configuration with login's current security context for
> windows authenticated sql server logins? I tested and it
> doesn't work!!!
> I have same windows nt sql server logins on both servers.
> Linked server security is configured in a way that all
> connections should be made using the login's current
> security context (third option). It means that all windows
> nt users should be able to refer database objects from the
> linked server in their queries (using fully qualified
> object name).
> Well..., it is not true!
> It works ONLY if windows nt user is connected locally to
> the server where linked server is defined! However, if the
> same windows nt user tries to do that from the client
> computer, query fails with login incorrect message.
> Did anybody try this? It's so stupid that I cannot believe
> it's true.
> Thankssql

Friday, March 9, 2012

server with windows authentication and wihout AD(kerberos)

Hi All!
I have two Windows Server 2000 with SQL Servers 2000 installed and
uses windows authentication only.
Can i use linked server without Security Account Delegation (no domain, AD,
... ) and not use SQL authentication?
P.S.: Presently I use pass-through windows account authentication (same
username/password on two windows servers), but this not works with linked
server.
Thanks in advance.
Igor.Hi
Mike answered this in microsoft.public.sqlserver.securitytools. Please do
not multi-post.
John
"Igor Aflatunov" <Igor Aflatunov@.discussions.microsoft.com> wrote in message
news:CA9B20F2-C6FA-4F59-83F3-7A809DC09184@.microsoft.com...
> Hi All!
> I have two Windows Server 2000 with SQL Servers 2000 installed and
> uses windows authentication only.
> Can i use linked server without Security Account Delegation (no domain,
> AD,
> ... ) and not use SQL authentication?
> P.S.: Presently I use pass-through windows account authentication (same
> username/password on two windows servers), but this not works with linked
> server.
> Thanks in advance.
> Igor.
>