SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
SafePeak: Login Permissions
Metadata Learning Permissions

SafePeak requires VIEW ANY DEFINITION permission in order to learn the structure of the database and
read the definition of stored procedures.

This can be done in the following way:

    1.   Connect to the SQL server instance using SQL server management studio
    2.   Create a new login for SafePeak
    3.   Open the server properties (right click on the server and select properties)
    4.   Select “Permissions” page
    5.   Find SafePeak user and grant it “View any definition” + Press OK
    6.   Open the properties of the SafePeak login
    7.   Select “User Mapping” page
    8.   Check databases that SafePeak needs access to (or you can just check all of them) + Press OK



Metadata Learning Login to Schema mapping

For Metadata purposes we compile a list of Login to default schema for each database.

To get this list the user logged for Metadata need to have permission to see other Logins.

The easy and simple approach is to grant SafePeak login ALTER ANY LOGIN on SERVER permission.

A less convenient yet more secured approach is to grant VIEW DEFINITION permission to SafePeak
Login for each existent Login on the Instance. The problem of this approach is that if a new user is
added a new permission should be granted to SafePeak login.




Copyright. SafePeak Technologies Ltd 2009       Page 1

Más contenido relacionado

Más de Vladi Vexler

SafePeak Configuration Guide
SafePeak Configuration GuideSafePeak Configuration Guide
SafePeak Configuration Guide
Vladi Vexler
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1
Vladi Vexler
 
SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR
Vladi Vexler
 
SafePeak Installation guide
SafePeak Installation guideSafePeak Installation guide
SafePeak Installation guide
Vladi Vexler
 
SafePeak Globes testimonial
SafePeak Globes testimonialSafePeak Globes testimonial
SafePeak Globes testimonial
Vladi Vexler
 
SafePeak - Poria hospital case study
SafePeak - Poria hospital case studySafePeak - Poria hospital case study
SafePeak - Poria hospital case study
Vladi Vexler
 
SafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmarkSafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmark
Vladi Vexler
 
SafePeak datasheet 2010
SafePeak datasheet 2010SafePeak datasheet 2010
SafePeak datasheet 2010
Vladi Vexler
 

Más de Vladi Vexler (18)

Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015 Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
 
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deckMySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
 
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
 
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
 
SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)
 
SafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingSafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic Caching
 
SafePeak Configuration Guide
SafePeak Configuration GuideSafePeak Configuration Guide
SafePeak Configuration Guide
 
SafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak ClusterSafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak Cluster
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1
 
SafePeak - How to configure SQL Server agent in a safepeak deployment
SafePeak - How to configure SQL Server agent in a safepeak deploymentSafePeak - How to configure SQL Server agent in a safepeak deployment
SafePeak - How to configure SQL Server agent in a safepeak deployment
 
SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud Apps
 
SafePeak Installation guide
SafePeak Installation guideSafePeak Installation guide
SafePeak Installation guide
 
SafePeak Globes testimonial
SafePeak Globes testimonialSafePeak Globes testimonial
SafePeak Globes testimonial
 
SafePeak - Poria hospital case study
SafePeak - Poria hospital case studySafePeak - Poria hospital case study
SafePeak - Poria hospital case study
 
SafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmarkSafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmark
 
SafePeak datasheet 2010
SafePeak datasheet 2010SafePeak datasheet 2010
SafePeak datasheet 2010
 
SafePeak whitepaper
SafePeak whitepaperSafePeak whitepaper
SafePeak whitepaper
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

SafePeak Installation - Login permissions requirements

  • 1. SafePeak: Login Permissions Metadata Learning Permissions SafePeak requires VIEW ANY DEFINITION permission in order to learn the structure of the database and read the definition of stored procedures. This can be done in the following way: 1. Connect to the SQL server instance using SQL server management studio 2. Create a new login for SafePeak 3. Open the server properties (right click on the server and select properties) 4. Select “Permissions” page 5. Find SafePeak user and grant it “View any definition” + Press OK 6. Open the properties of the SafePeak login 7. Select “User Mapping” page 8. Check databases that SafePeak needs access to (or you can just check all of them) + Press OK Metadata Learning Login to Schema mapping For Metadata purposes we compile a list of Login to default schema for each database. To get this list the user logged for Metadata need to have permission to see other Logins. The easy and simple approach is to grant SafePeak login ALTER ANY LOGIN on SERVER permission. A less convenient yet more secured approach is to grant VIEW DEFINITION permission to SafePeak Login for each existent Login on the Instance. The problem of this approach is that if a new user is added a new permission should be granted to SafePeak login. Copyright. SafePeak Technologies Ltd 2009 Page 1