I think you're right on the money Troy, and I'll try what you're suggesting and spend some time because that sounds like a very good idea. I'd like to try and simplify the steps you outline down to what I've mentioned below... if that sounds plausible to you guys (I'm asking, because I think the order is what's been messing me up).
1. Connect to Server B (sql server) using sysadmin (sa user) from Server B. 2. Create new database on Server B using user sysadmin from above. 3. Grant login rights and dbo role on new databases to the original set of credentials from machine A (the user running the install). Troy Howard wrote: > > Seems like the workflow is: > > 1. Connect to Server B (sql server) using an existing sql login (not > windows), that has less than admin level rights (configured where? created > when?). > 2. Somehow obtain different credentials from Server B that have > administrative rights on Server B. > 3. Connect with new credentials to Server B > 4. Create/Attach new database to Server B. > 5. Grant login rights and dbo role on new databases to the original set of > credentials. > > The work flow is flawed though.. It's flawed, because the only way that it > could work would be if the initial lower access account was powerful > enough > to gain admin access through the second account.... Then what is the point > of a second secure admin account in the first place? It's a major security > hole to attempt a solution that would work that way. > > > What you should do instead is... > > 1. Ask user to provide admin credentials and server name/instance for > "Server B" during install (or in a less user friendly context, ask for a > whole connection string). > 2. Ask user to provide account information for a new login account to be > used by "Machine A". (username, password for sql login, or just > domain\account for windows auth) > 3. Connect to Server B with provided existing admin account. > 4. Create/Attach database. > 5. Create new account for Machine A. > 6. Grant login rights and dbo role on new database to the new account. > > Does that make sense, or did I miss the point somewhere? > > Hope that helps, > Troy > > > > > On Tue, Sep 9, 2008 at 2:38 PM, David Reed (SQL) > <[EMAIL PROTECTED]>wrote: > >> If the identity running the installation doesn't have sysadmin >> privileges, >> you're not going to be able to grant anything to yourself... Maybe I'm >> not >> understanding the workflow that you're trying to achieve. We can take it >> offline if you like. >> >> >> >> >> -----Original Message----- >> From: [EMAIL PROTECTED] [mailto: >> [EMAIL PROTECTED] On Behalf Of cemiles >> Sent: Tuesday, September 09, 2008 13:32 >> To: wix-users@lists.sourceforge.net >> Subject: [WiX-users] Re mote SQL Authentication >> >> >> If anyone has come across this let me know. I can post my code if so, >> hopefully for a little advice because I'm between a rock and a >> hard-place. >> >> I need to run my install on a machine (Server A), and need to use sql >> authentication to grab a user w/ sysadmin rights on the remote machine >> (Server B), then use that to create the DB on Server B. Then on Server B >> I'm trying to grantlogin to the user I'm running the install under on >> Server >> A and change the dbo after that. >> >> I'm pretty much stuck and have tried so many scenarios and after a bunch >> of >> reading still no solution. I think the problem resides in my sqlstring >> element. >> >> Any helpers out there? >> -- >> View this message in context: >> http://n2.nabble.com/Remote-SQL-Authentication-tp1078503p1078503.html >> Sent from the wix-users mailing list archive at Nabble.com. >> >> >> ------------------------------------------------------------------------- >> This SF.Net email is sponsored by the Moblin Your Move Developer's >> challenge >> Build the coolest Linux based applications with Moblin SDK & win great >> prizes >> Grand prize is a trip for two to an Open Source event anywhere in the >> world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> WiX-users mailing list >> WiX-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/wix-users >> >> >> ------------------------------------------------------------------------- >> This SF.Net email is sponsored by the Moblin Your Move Developer's >> challenge >> Build the coolest Linux based applications with Moblin SDK & win great >> prizes >> Grand prize is a trip for two to an Open Source event anywhere in the >> world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> WiX-users mailing list >> WiX-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/wix-users >> > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge > Build the coolest Linux based applications with Moblin SDK & win great > prizes > Grand prize is a trip for two to an Open Source event anywhere in the > world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > WiX-users mailing list > WiX-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/wix-users > > -- View this message in context: http://n2.nabble.com/Remote-SQL-Authentication-tp1078503p1078789.html Sent from the wix-users mailing list archive at Nabble.com. ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ WiX-users mailing list WiX-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/wix-users