Configuring the authentication mode in ssms

Assignment Help Database Management System
Reference no: EM13725110

Part -1:

Configuring the Authentication Mode in SSMS

In this exercise, you will configure the authentication mode for the SQL Server instance. You will ensure that the authentication mode is set to mixed mode so that the remaining exercises in this chapter will function properly. To do this:

1. Launch SSMS.

2. Right-click on the SQL Server instance you want to configure and select Properties.

3. Select the Security page to view the authentication mode settings.

4. Ensure that the authentication mode is set to SQL Server and Windows authentication mode, which is mixed mode.

620_view the authentication mode settings.png

5. Click OK to save the changes.

6. If you see a message indicating that the service must be restarted, right-click on the instance and select Restart.

Part -2:

Creating a SQL Login

In this exercise, you will create a SQL login for a user named Monty with a password of 7Pass8now.

1. Launch SSMS.

2. Expand the Security section in Object Explorer.

3. Right-click the Logins container and select New Login.

4. Enter the word Monty in the Login name field.

5. Check the SQL Server authentication radio button.

6. Enter 7Pass8now in both the Password and Confirm Password fields.

1822_view the authentication mode settings1.png

7. Accept all other defaults, click the selector arrow next to the Script button, and choose Script Action to New Query Window.

8. Click the OK button. (If you are running SQL Server on Windows XP, you may have to clear the User Must Change Password at Next Login check box.)

9. Notice the code in the new query window is similar to the following:

CREATE LOGIN [monty] WITH PASSWORD=N'7Pass8now ‘ MUST_CHANGE,

DEFAULT_DATABASE=[master], CHECK_EXPIRATION=ON, CHECK_POLICY=ON

Part- 3:

Viewing Local password policies

In this exercise, you will view the password policies on a non-domain member server that is running SQL Server 2008. Domain member SQL Servers receive their password policies from the domain. Only the Domain Admins and the Enterprise Admins group members can manage the domain password policies. To view the local password policies, follow these steps:

1. Click Start and select Run.

2. Type gpedit.msc into the Open field and click OK.

3. In the Local Computer Policy\Computer Configuration section, expand the Windows Settings container.

4. Expand the Security Settings container.

5. Expand the Account Policies container.

6. Click on the Password Policy container. From here, you can view and manage the local password policies.

Part -4:

Creating Windows Logins

In this exercise, you will create a Windows login by first creating a Windows user account and then a Windows group account. Next, you will map these accounts to a Windows login in SQL Server 2008. To do this, follow these steps. Please note that this exercise assumes the use of local users and groups on Windows Server 2008.

1. Right-click My Computer on your SQL Server machine's desktop and select Manage.

2. Expand the Configuration container and then the Local Users and Groups container.

889_view the authentication mode settings2.png

3. Right-click the Users container and select New User.

4. Enter Jeremy in the User Name field.

5. Enter 7pass8now in both the Password and Confirm Password fields.

6. Deselect the User Must Change Password at Next Logon check box.

359_view the authentication mode settings3.png

7. Click the Create button to create the user account. Click the Close button to close the dialog.

8. Right-click the Groups container and select New Group.

9. For the Group name field, enter sQLusers.

10. In the Description field, enter users with access to sQL server.

350_view the authentication mode settings4.png


11. Click the Create button to create the group.

12. Click the Close button to close the New Group dialog.

13. Close the Server Manager application.

14. Launch SQL Server Management Studio.

15. Expand the Security container in Object Explorer.

16. Right-click the Logins container and select New Login.

17. Click the Search button to find the account you created for Jeremy.

18. Type Jeremy in the Enter the Object Name to Select field and click the Check Names button. The dialog will automatically enter the full name for the user, which includes the server name and the username. A domain user would have a format like this: domainName\userName.

900_view the authentication mode settings5.png

19. Click OK.

20. In the New Login dialog, click OK again to create the mapping to the Windows user account.

21. To create the mapping for the SQLUsers group, right-click the Logins container and select New Login.

22. Click the Search button to search for the SQLUsers group.

23. Click the Object Types button to bring up the Object Types dialog box and then check the Groups check box (the other check boxes will already be checked) and then click OK.

188_view the authentication mode settings6.png

24. Type sQLusers in the Enter the Object Name to Select field and click the Check Names button.

25. Click the OK button.

26. Click the OK button in the New Login dialog to create the group-based login.

Part -5:

Creating a database role with SSMS

In this exercise, you will perform the simple steps required to create a database role using SSMS. To do this:

1. Expand the Databases container.

2. Expand the container for the database in which you want to create a custom or application role.

3. Expand the Security container and right-click on the Roles container to select New -> Database Role or New -> Application Role.

The following graphic shows the results of creating a new database role in SSMS.

2178_Databases container.png

Part -6:

Creating a database user

In this exercise, you will create a database user. You will create the user with the CREATE USER T-SQL command. You will also create an account for a user named Fred in the database named Books. To do this, follow these steps:

1. Launch SQL Server Management Studio.

2. Connect to the SQL Server instance containing the database in which you want to create a user. Log in as an administrator.

3. Click the New Query button.

4. In the new query window, enter the following code.

USE Books;
GO
CREATE USER fred;
GO

5. Click the Execute button to run the code.

Reference no: EM13725110

Questions Cloud

What is the value of the interest rate tax shield : A company has a wacc equal to 15.00%, a constant and perpetual expected EBITDA equal to 3,100,000 Euro, an unlevered return on equity of 22.53% and it keeps a constant debt-to-equity ratio. If the tax rate is equal to 25% and the assets are fully dep..
What you found interesting and surprising in this past week : what you found interesting, surprising, or confusing in this past week. Did anything that you learned cause you to understand an issue and event differently?
The phrase reflects two characteristics intelligence : How did the phrase "dumb jock" come to be? (This is a rhetorical question.) The phrase reflects two characteristics, intelligence and athletic prowess. Let us suppose that above average intelligence occurs in 25 out 100 children and superior at..
Selecting and interviewing a professional : The first part involves selecting and interviewing a professional within your chosen career. (The professional should have a minimum of 5 years in the field.) The purpose of this interview is to gain a realistic view of the profession you are ente..
Configuring the authentication mode in ssms : Launch SSMS - Right-click on the SQL Server instance you want to configure and select Properties - you will configure the authentication mode for the SQL Server instance. You will ensure that the authentication mode is set to mixed mode so that the..
Whose responsibility it is to communicate the vision : Whose responsibility it is to communicate the vision of the company during a time of mergers to the employees and about the impending mergers of the company being acquired?
What are the strengths and weaknesses : Sears Holdings Company has had continuous earnings decline since its creation in 2005 from a merger of Sears and Kmart. Do an internal and external analysis of the company and address the following within your discussion board post; What are the stre..
What are parallel between debates over alcohol and marijuana : What are some parallels between the debates over alcohol and the debate over marijuana? Why was Prohibition doomed to fail? The relationship between Prohibition and bigotry.
Create strategic plan for riordan manufacturing : Create a 2,500- to 3,500-word strategic plan for Riordan Manufacturing starting from what you learned in Week One and using a similar strategic management process as Concepts in Strategic Management and Business Policy

Reviews

Write a Review

Database Management System Questions & Answers

  Characteristic of a database that has data redundancy

Explain one characteristic of a database that has data redundancy. Note: Redundancy in our context is not a good thing

  Justification hello good night what is the justification

hello good night what is the justification for utalizing database management system approach i3939m not

  Write a select statement that joins the customers

Write a SELECT statement that joins the Customers, Orders, OrderItems, and Products Tables. This statement should return these columns: LastName, FirstName, OrderDate, ProductName, ItemPrice, DiscountAmount, and Quantity.

  Write procedure to construct character frequency table

Write the procedure named Get_frequencies which constructs character frequency table. Input to procedure must be a pointer to the string, and pointer to array of 256 doublewords.

  Describe object-orientated databases

"Object-Orientated Databases will eventually supplant Relational Databases and RDBMSs as the predominant data storage / retrieval paradigm.

  The database dish.xlsx contains a transaction history

The database Dish.xlsx contains a transaction history describing more than 4,000 purchases of detergent

  Identify the candidate key

For each of the following sets of FDs, assuming those are the only dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is ..

  Use the contents of figure 1 to work problems 1-31write the

use the contents of figure 1 to work problems 1-3.1.write the business rules that govern the relationship between agent

  How would your answers to the two questions change

How would your answers to the two questions change, if at all, if your system did not support indexes with multiple-attribute search keys?

  Design and build a small database application

In Word, identify a potential database application. It should be based on data you understand well, such as student data (refer to text), a hobby (see Lesson 8), or a set of data you use on the job. When you have made your choice, proceed to Step ..

  What must a user guarantee with respect to a transaction and

What must a user guarantee with respect to a transaction and database consis-tency? What should a DBMS guarantee with respect toconcurrent execution of several transactions and database consistency?

  Determine the cartesian product of sets

Determine the Cartesian product (A X B) of the given pair of sets. A => Set of first letter of names of countries = A = { R, S, T } B => Set of numbers denoting Postal codes = B = { 0001, 1001}.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd