Configuring the authentication mode in ssms

Assignment Help Database Management System
Reference no: EM13725110

Part -1:

Configuring the Authentication Mode in SSMS

In this exercise, you will configure the authentication mode for the SQL Server instance. You will ensure that the authentication mode is set to mixed mode so that the remaining exercises in this chapter will function properly. To do this:

1. Launch SSMS.

2. Right-click on the SQL Server instance you want to configure and select Properties.

3. Select the Security page to view the authentication mode settings.

4. Ensure that the authentication mode is set to SQL Server and Windows authentication mode, which is mixed mode.

620_view the authentication mode settings.png

5. Click OK to save the changes.

6. If you see a message indicating that the service must be restarted, right-click on the instance and select Restart.

Part -2:

Creating a SQL Login

In this exercise, you will create a SQL login for a user named Monty with a password of 7Pass8now.

1. Launch SSMS.

2. Expand the Security section in Object Explorer.

3. Right-click the Logins container and select New Login.

4. Enter the word Monty in the Login name field.

5. Check the SQL Server authentication radio button.

6. Enter 7Pass8now in both the Password and Confirm Password fields.

1822_view the authentication mode settings1.png

7. Accept all other defaults, click the selector arrow next to the Script button, and choose Script Action to New Query Window.

8. Click the OK button. (If you are running SQL Server on Windows XP, you may have to clear the User Must Change Password at Next Login check box.)

9. Notice the code in the new query window is similar to the following:

CREATE LOGIN [monty] WITH PASSWORD=N'7Pass8now ‘ MUST_CHANGE,

DEFAULT_DATABASE=[master], CHECK_EXPIRATION=ON, CHECK_POLICY=ON

Part- 3:

Viewing Local password policies

In this exercise, you will view the password policies on a non-domain member server that is running SQL Server 2008. Domain member SQL Servers receive their password policies from the domain. Only the Domain Admins and the Enterprise Admins group members can manage the domain password policies. To view the local password policies, follow these steps:

1. Click Start and select Run.

2. Type gpedit.msc into the Open field and click OK.

3. In the Local Computer Policy\Computer Configuration section, expand the Windows Settings container.

4. Expand the Security Settings container.

5. Expand the Account Policies container.

6. Click on the Password Policy container. From here, you can view and manage the local password policies.

Part -4:

Creating Windows Logins

In this exercise, you will create a Windows login by first creating a Windows user account and then a Windows group account. Next, you will map these accounts to a Windows login in SQL Server 2008. To do this, follow these steps. Please note that this exercise assumes the use of local users and groups on Windows Server 2008.

1. Right-click My Computer on your SQL Server machine's desktop and select Manage.

2. Expand the Configuration container and then the Local Users and Groups container.

889_view the authentication mode settings2.png

3. Right-click the Users container and select New User.

4. Enter Jeremy in the User Name field.

5. Enter 7pass8now in both the Password and Confirm Password fields.

6. Deselect the User Must Change Password at Next Logon check box.

359_view the authentication mode settings3.png

7. Click the Create button to create the user account. Click the Close button to close the dialog.

8. Right-click the Groups container and select New Group.

9. For the Group name field, enter sQLusers.

10. In the Description field, enter users with access to sQL server.

350_view the authentication mode settings4.png


11. Click the Create button to create the group.

12. Click the Close button to close the New Group dialog.

13. Close the Server Manager application.

14. Launch SQL Server Management Studio.

15. Expand the Security container in Object Explorer.

16. Right-click the Logins container and select New Login.

17. Click the Search button to find the account you created for Jeremy.

18. Type Jeremy in the Enter the Object Name to Select field and click the Check Names button. The dialog will automatically enter the full name for the user, which includes the server name and the username. A domain user would have a format like this: domainName\userName.

900_view the authentication mode settings5.png

19. Click OK.

20. In the New Login dialog, click OK again to create the mapping to the Windows user account.

21. To create the mapping for the SQLUsers group, right-click the Logins container and select New Login.

22. Click the Search button to search for the SQLUsers group.

23. Click the Object Types button to bring up the Object Types dialog box and then check the Groups check box (the other check boxes will already be checked) and then click OK.

188_view the authentication mode settings6.png

24. Type sQLusers in the Enter the Object Name to Select field and click the Check Names button.

25. Click the OK button.

26. Click the OK button in the New Login dialog to create the group-based login.

Part -5:

Creating a database role with SSMS

In this exercise, you will perform the simple steps required to create a database role using SSMS. To do this:

1. Expand the Databases container.

2. Expand the container for the database in which you want to create a custom or application role.

3. Expand the Security container and right-click on the Roles container to select New -> Database Role or New -> Application Role.

The following graphic shows the results of creating a new database role in SSMS.

2178_Databases container.png

Part -6:

Creating a database user

In this exercise, you will create a database user. You will create the user with the CREATE USER T-SQL command. You will also create an account for a user named Fred in the database named Books. To do this, follow these steps:

1. Launch SQL Server Management Studio.

2. Connect to the SQL Server instance containing the database in which you want to create a user. Log in as an administrator.

3. Click the New Query button.

4. In the new query window, enter the following code.

USE Books;
GO
CREATE USER fred;
GO

5. Click the Execute button to run the code.

Reference no: EM13725110

Questions Cloud

What is the value of the interest rate tax shield : A company has a wacc equal to 15.00%, a constant and perpetual expected EBITDA equal to 3,100,000 Euro, an unlevered return on equity of 22.53% and it keeps a constant debt-to-equity ratio. If the tax rate is equal to 25% and the assets are fully dep..
What you found interesting and surprising in this past week : what you found interesting, surprising, or confusing in this past week. Did anything that you learned cause you to understand an issue and event differently?
The phrase reflects two characteristics intelligence : How did the phrase "dumb jock" come to be? (This is a rhetorical question.) The phrase reflects two characteristics, intelligence and athletic prowess. Let us suppose that above average intelligence occurs in 25 out 100 children and superior at..
Selecting and interviewing a professional : The first part involves selecting and interviewing a professional within your chosen career. (The professional should have a minimum of 5 years in the field.) The purpose of this interview is to gain a realistic view of the profession you are ente..
Configuring the authentication mode in ssms : Launch SSMS - Right-click on the SQL Server instance you want to configure and select Properties - you will configure the authentication mode for the SQL Server instance. You will ensure that the authentication mode is set to mixed mode so that the..
Whose responsibility it is to communicate the vision : Whose responsibility it is to communicate the vision of the company during a time of mergers to the employees and about the impending mergers of the company being acquired?
What are the strengths and weaknesses : Sears Holdings Company has had continuous earnings decline since its creation in 2005 from a merger of Sears and Kmart. Do an internal and external analysis of the company and address the following within your discussion board post; What are the stre..
What are parallel between debates over alcohol and marijuana : What are some parallels between the debates over alcohol and the debate over marijuana? Why was Prohibition doomed to fail? The relationship between Prohibition and bigotry.
Create strategic plan for riordan manufacturing : Create a 2,500- to 3,500-word strategic plan for Riordan Manufacturing starting from what you learned in Week One and using a similar strategic management process as Concepts in Strategic Management and Business Policy

Reviews

Write a Review

Database Management System Questions & Answers

  Transform the tables into one or more tables in bcnf

Transform the tables into one or more tables in BCNF. State the primary keys, candidate keys, and referential integrity constraints.

  A prestigious university has recently implemented a

a prestigious university has recently implemented a consolidation strategy that will require it to centralize their

  Define conceptual design

Water meters must be replaced when they have been in use for 5 years. We can assume that a meter will never be damaged or become unserviceable and will not be re-assigned to another service address.

  Create a database design - relational data model

Create a database design specification Enhanced Entity Relationship Diagram (EERD) and Relational Data Model from the given business description - Database Management System

  The packing list describes the ideal contents

The packing list describes the ideal contents of each package, but it is not always possible to include the ideal number of each item. Therefore, the actual items included in each package should be tracked. A package can contain many different ite..

  What is the cardinality of an entity

What is the cardinality of an entity - Why is it useful to consider the cardinality when designing a database?

  Database planner should spend a considerable amount of time

Provide what reports may be produced as a result of your database design.Based on the information you have researched, create a 2-3 page design document that includes a description of the database you would like to create as well as sample tables ..

  Design er schema to keep track of information of votes

Design an er schema for keeping track of information about votes taken in the U.S. House of Representatives during the current two year congressional session.

  Describes a virtualization project

Subsequently, the evaluation of the project is based on different types of virtualization mechanisms compared to standard physical server deployment.

  Explain the concept of physical data independence

Explain the concept of physical data independence and its importance in database systems,  List four significant differences between a file-processing system and a DBMS.

  How relationships are represented in a relational database

Describe in your own words and illustrate with tables how relationships are represented in a relational database?

  Write a prolog program that implements a family database

Write a PROLOG program that implements a family database for your family. Save it as an ordinary text file named family.pro. Your program should implement the following facts for your immediate family, grandparents, and great-grandparents.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd