Please start any new threads on our new site at https://forums.sqlteam.com. We've got lots of great SQL Server experts to answer whatever question you can come up with.

 All Forums
 SQL Server 2000 Forums
 SQL Server Development (2000)
 Restricting Sys Admin from using xp_

Author  Topic 

AskSQLTeam
Ask SQLTeam Question

0 Posts

Posted - 2002-09-09 : 09:34:25
Andrew writes "SQLTeam,

I need to prevent certain System Administrators from using an extended store procedure. The procedure was developed in house and is related to encryption.

Is there anyway to accomplish this?

Windows 2000 sp2
SQL Server Enterprise & Standard Edition 2000 sp2

Thanks,
Andrew"

robvolk
Most Valuable Yak

15732 Posts

Posted - 2002-09-09 : 09:35:56
As long as they are members of the sysadmin role, they will be able to execute it. If you are concerned about certain people misusing this procedure they don't sound like reliable sysadmin candidates.

Go to Top of Page

ehorn
Master Smack Fu Yak Hacker

1632 Posts

Posted - 2002-09-09 : 09:37:55
Can you create a new role with restricted access?

Go to Top of Page

jasper_smith
SQL Server MVP & SQLTeam MVY

846 Posts

Posted - 2002-09-09 : 15:03:53
You cannot prevent a member of the sysadmin fixed server role from doing anything in SQL - they are the system admins, end of story. As rob says - if you don't trust your sysadmins then they shouldn't be sysadmmins.


HTH
Jasper Smith
Go to Top of Page

ehorn
Master Smack Fu Yak Hacker

1632 Posts

Posted - 2002-09-09 : 15:22:11
We should not presume that this question is an issue of trust
(or a lack of trust motivated from within an organization).

Many large client organizations require that certain sensitive information (if not all) be restricted (eg. Passwords, SSNs or encryption/decryption algorythms)

Many clients will not do business with companies that cannot provide assurance that these security type mechanisms are in place and that policies such as these are adhered to.

I agree with the previous member comments (You should be confident in your team)
but I should not presume that the question is related to potential internal conflicts.

Go to Top of Page

robvolk
Most Valuable Yak

15732 Posts

Posted - 2002-09-09 : 15:41:58
You're right, in a way, but it still doesn't address the point. Realistically, if there are people who shouldn't execute this extended procedure, then they shouldn't (and physically can't) have system administrator privileges. I think it IS safe to presume that Andrew either has reservations about someone's integrity, or he is trying to establish the proper security for the group's members.

In any case, the user(s) must be taken out of sysadmin and added to serveradmin, processadmin, sercurityadmin, etc. or whatever other roles are needed to do their job(s). That's one of the larger issues in this question: what do these admins do, and what should they NOT be allowed to do? That's not just a SQL Server issue but also an organizational one.

As you said here:
quote:
Many clients will not do business with companies that cannot provide assurance that these security type mechanisms are in place and that policies such as these are adhered to.
It really doesn't matter what the reason is, the answer is the same: they cannot belong to sysadmin, and they probably shouldn't.

Go to Top of Page

empire
Starting Member

40 Posts

Posted - 2002-09-09 : 16:13:21
Maybe Andrews question is more like this one (and mine)

If you have NT System Administrators, how do you block them from being SQL System Administrators using Windows Authentication?

Thats my problem I have, I want to force certain Admins into SQL using SQL Server Id's?

How would one do this?

Programmers are simple devices, put caffeine in, and get code out.
Go to Top of Page

robvolk
Most Valuable Yak

15732 Posts

Posted - 2002-09-09 : 16:25:03
You can add their Windows logins to the SQL Server and then set those logins to deny access to the server. That would then require them to use a SQL Server login to connect.

Go to Top of Page

empire
Starting Member

40 Posts

Posted - 2002-09-09 : 17:27:34
Nice, thanks for the tip!

Hope that helps Andrew as well and that I didn't steal the thread

Programmers are simple devices, put caffeine in, and get code out.
Go to Top of Page

empire
Starting Member

40 Posts

Posted - 2002-09-09 : 17:28:28
Nice, thanks for the tip!

Hope that helps Andrew as well and that I didn't steal the thread

Programmers are simple devices, put caffeine in, and get code out.
Go to Top of Page

ksw
Starting Member

24 Posts

Posted - 2002-09-09 : 17:35:59
quote:
If you have NT System Administrators, how do you block them from being SQL System Administrators using Windows Authentication?


First of all, make sure that you have removed the login Builtin\Administrators. This is a Windows group that is put into SQL Server by default. Any admins on your network will belong to this group. Since the service account for SQL Server has to be there, and if your company is like mine, the SQL Server programs were installed by a domain admin account, then you have to use Enterprise Manager to lock unwanted people out. Change the EM connection properties to use a SQL Server account (we use SA and the network admins don't know the password) and to always prompt for the login info.

Also, it is recommended that you don't have any Windows groups set up as a SQL Server login. Since the DBA's aren't necessarily the network admins, the DBA looses control over who can be a member of the group and what permissions they have. If someone is added to a Windows group, SQL Server has no knowledge of that.

Hope that helps some,
--KSW

Go to Top of Page

gwhiz
Yak Posting Veteran

78 Posts

Posted - 2002-09-09 : 18:19:20
I agree with ksw. The builtin\administrators group needs to have sysadmin access revoked. But make sure the you have added yourself as a sysadmin first.

Second I disagree with ksw I handle all of my security through groups I have no interest in spending 2-3 hours a day updating users. Leave this to the NT groups. I also would not connect using an SA account unless I had to have the security set to mixed. Why open another security hole when you don't have to.

Go to Top of Page

robvolk
Most Valuable Yak

15732 Posts

Posted - 2002-09-09 : 19:18:58
quote:
I have no interest in spending 2-3 hours a day updating users. Leave this to the NT groups.
I agree with this as well. NT Groups are an excellent way to manage security on a SQL Server. This should not be a question of an existing, general/public NT Group being added to SQL Server. If any users should NOT have access to SQL Server, then a new group should be created for SQL Server and that group's membership be maintained by the network admins, even if it is 99% identical to another group. Naturally, any NT/SQL Server group admininstration should be communicated between both sides regularly.

Go to Top of Page
   

- Advertisement -