After a few google searches and a quick look at the issues here, I can't find what I thought would be the cookbook answer for SQL Server permissions.
As I often see in small stores, most developers here used an administrator account for SQL Server during development. I want to configure the roles and permissions that I can assign to developers so that we can complete our tasks, but also do so with minimal permissions. Can anyone offer advice on what SQL Server permissions to assign?
Components:
- SQL Server 2008
- SQL Server Reporting Services (SSRS) 2008
- SQL Server Integration Services (SSIS) 2008
Platforms:
- Products
- Inclusion / QA
- Development / Integration
We are launching mixed-mode protection due to some legacy applications and networks, but we are moving on to Windows Auth. I'm not sure if this really affects the role setting.
I plan to configure read-only access for developers to the Prod and Staging / QA databases. However, I still want developers to keep the ability to run profiling.
We need deployment accounts with higher privilege levels. We are currently trying to figure out exactly what privileges we need to deploy SSIS packages.
Inside a development server, developers need wide privileges. However, I'm not sure that just making them all admins is really the best choice.
It's hard to believe that no one has published a decent example script that installs such roles with a good set of appropriate permissions for developers and deployers.
We can probably figure it all out by blocking things and then adding permissions when we discover the need, but that will be too much PITA for everyone.
Can someone point me or provide a good example for permissions for these roles on these platforms?
source share