473,791 Members | 2,899 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Log logins

On a huge Sql-Server 7 installation, we have various client applications
distributed along the Lan, accessing one main database.

Each application accesses the db using one out of around ten logins. Most of
them, have only DBDataReader right on the db, as they are consultation
consolles only.

In order to monitor db usage, the customer requires some kind of log of user
access.

My need, mainly, is to INSERT a record into a log table, recording Date,
Time, Login, Host of each access.

But, and this is the problem, the job has to be done by the server itself,
not by each client, because of various reasons:
1) we don't like to increase rights of logins
2) we don't plan to change anything in our custom client application
3) few of those client applications have been developed by foreign
suppliers, so we cannot change them.

My question is: does it exist any kind of authentication LOG, which I can
work on?
Or, is it possible to activate a kind of TRIGGER, reacting on login
authentication?

Thanks in advance

Alberto
Jul 20 '05 #1
2 3290
If you right-click on the server name in enterprise manager (EM) and click
on properties, click on the SECURITY TAB.
You can then audit sucessfull logins, login failures, or all. There is only
2 things you have to remember.
1. You will have to read either the SQL server error log or the Application
log of Windows.
2. If people use generic logins or shared logins, you might not be able to
detect who it was that logged in.

Hope this helps
Oscar...

"Albe V°" <va************ *****@hotmail.c om> wrote in message
news:JA******** **************@ twister2.libero .it...
On a huge Sql-Server 7 installation, we have various client applications
distributed along the Lan, accessing one main database.

Each application accesses the db using one out of around ten logins. Most of them, have only DBDataReader right on the db, as they are consultation
consolles only.

In order to monitor db usage, the customer requires some kind of log of user access.

My need, mainly, is to INSERT a record into a log table, recording Date,
Time, Login, Host of each access.

But, and this is the problem, the job has to be done by the server itself,
not by each client, because of various reasons:
1) we don't like to increase rights of logins
2) we don't plan to change anything in our custom client application
3) few of those client applications have been developed by foreign
suppliers, so we cannot change them.

My question is: does it exist any kind of authentication LOG, which I can
work on?
Or, is it possible to activate a kind of TRIGGER, reacting on login
authentication?

Thanks in advance

Alberto

Jul 20 '05 #2
Albe V° (va************ *****@hotmail.c om) writes:
On a huge Sql-Server 7 installation, we have various client applications
distributed along the Lan, accessing one main database.

Each application accesses the db using one out of around ten logins.
Most of them, have only DBDataReader right on the db, as they are
consultation consolles only.

In order to monitor db usage, the customer requires some kind of log of
user access.

My need, mainly, is to INSERT a record into a log table, recording Date,
Time, Login, Host of each access.


The best tool for this is the SQL Profiler. Set up a trace that captures
login events. I don't have the SQL7 docs available, so I prefer to not
give any details, but refer you to Books Online. On SQL2000 you can set
C2 auditing, which enures that you don't loose events if the log runs
out of disk space. (That throttles the server instead.) But I don't think
C2 is available on SQL7. Then again, with only ten users, you are not
likely to fill the log if you only filter logins.

Beware, though, that applications that may be written so that they
connect and reconnect frequently, for instance once per query.

--
Erland Sommarskog, SQL Server MVP, so****@algonet. se

Books Online for SQL Server SP3 at
http://www.microsoft.com/sql/techinf...2000/books.asp
Jul 20 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
5907
by: Dave | last post by:
I am doing a complete backup on a sql 7 db and then doing a complete restore (with overwrite existing db) on a sql 2000 server. This is now our hot standby server. I have the process automated and it works great. The only problem I have now is the logins dont work. I have tried running EXEC sp_change_users_login 'Report', and the logins appear. However, when I run EXEC sp_helplogins 'joe', the results are empty. So, I am guessing all...
2
6886
by: Len Svitenko | last post by:
How can I get a list of all SQL server logins that are on a given sql server? What sql query would get me that? Or is there an sp that gives me that. Also, if it could list what db they have rights to that would be great also.
1
1666
by: David McGeorge | last post by:
I am confused about windows account, win dimain account, sql login accoun and sql database user account.... can you give me a fresh example to show the exact relationship between them and how they work together?
4
3869
by: tchangmian | last post by:
Hi, I would like to create an auto-lock out module where users are unable to continue login attempt after 3-5 unsuccessful logins. In addition, the user account are automatically suspended after stipulated unsuccessful logins. Is there any sample coding in ASP or Javascript for me to refer to?? Thanks alot!!!
3
4451
by: mgPA | last post by:
Short: How can I limit the number of concurrent logins to Access (2000) DB? Long: I seem to be having the problem discussed in previous postings of having more than 9 or 10 concurrent logins. If I can limit the number of concurrent logins to 8 or 9, that would satisfy our needs. Thanks
4
2820
by: Burt | last post by:
Hi All, I need to develop an C# internet app with logins, eg you create a username and password, the password can be emailed to you if you forget it, you can change the password etc. Before I reinvent the wheel, does anyone know of sample code online that will do this? Perhaps something from MS? I looked around but couldn't find anything.
2
1995
by: happyjenny52 | last post by:
Hi, I work as an IT Administrator and part of my job role is to use Enterprise Manager and Query Analyzer to backup the logins and permissions for each database on our SQL Servers. This information is used as a backup in the event of a server failing so we then have something to fall back on if we need to add the same logins/permissions again. This takes ages to do, as I have to manually enter all the information
8
1736
by: Simon Gorski | last post by:
I have a large problem, and I believe there is not yet a way to solve this using IIS and ASP.NET. I hope someone has a solution which we couldn't find. The current situation When a user logs in to our website, we implement a single login for multiple services (let's call them services A-D). This means, that on the backend, while sampleuser logs in to our service with only one username and password, he is automatically logged in to...
3
30309
by: Inna | last post by:
Hello all, I am looking for the script, which I believe exists already.I need to be able to populate the script for security of one database and apply it to another database, even if it is located on another server: 1. All logins which not exist have to be created and which exists ignored including the NT accounts 2. Users same as the old database + the existing ones stay in database 3. Passwords for the new logins. 4. All...
0
10426
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9993
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9029
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7537
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6776
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5430
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5558
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4109
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3713
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.