官术网_书友最值得收藏!

Security accounts for SQL Server

SQL Server as well as other technologies within the SQL Server technology set need to log in to the operating system. From a security point of view, it is important to set an account for every service correctly. The general recommendation is to create a login account for every service of SQL Server separately with the weakest permissions. As the installation process itself is run in administrator security context, the installer will set permissions for every account correctly within the installation. The following are the most used scenarios:

  • Built-in service accounts: This type of account provides less control from the administrator's side and it's good enough for small, standalone installations of SQL Server. In a bigger domain environment, it's not recommended at all.
  • Dedicated domain account: This option means that the domain administrator prepares dedicated domain accounts with regular user rights (no elevated permissions needed) and during installation (or after the installation), prepared domain accounts are set. A big concern is that such domain accounts must fulfill security policies, namely password expiration, and SQL Server as a machine cannot create its own password for, say, every three months.
  • Managed service accounts: Managed service accounts are domain accounts similar to regular domain accounts. Unlike domain accounts, managed service accounts create and change their passwords without any action needed from live administrators. That's why a managed service account is usually the best approach to setting security accounts for SQL Server and its services.
主站蜘蛛池模板: 沙湾县| 博罗县| 阿拉尔市| 峨眉山市| 通化市| 红安县| 铜鼓县| 鄂温| 葫芦岛市| 始兴县| 萨迦县| 文水县| 旌德县| 全椒县| 淮北市| 九台市| 海林市| 繁昌县| 乐亭县| 游戏| 镇原县| 武鸣县| 剑川县| 娄烦县| 江华| 乌苏市| 营山县| 临沧市| 天峨县| 仪征市| 宿州市| 虹口区| 新田县| 合肥市| 赤峰市| 荣昌县| 揭阳市| 闽清县| 阿图什市| 都江堰市| 孝义市|