On a huge Sql-Server 7 installation, we have various client applications
distributed along the Lan, accessing one main database.
Each application accesses the db using one out of around ten logins. Most of
them, have only DBDataReader right on the db, as they are consultation
consolles only.
In order to monitor db usage, the customer requires some kind of log of user
access.
My need, mainly, is to INSERT a record into a log table, recording Date,
Time, Login, Host of each access.
But, and this is the problem, the job has to be done by the server itself,
not by each client, because of various reasons:
1) we don't like to increase rights of logins
2) we don't plan to change anything in our custom client application
3) few of those client applications have been developed by foreign
suppliers, so we cannot change them.
My question is: does it exist any kind of authentication LOG, which I can
work on?
Or, is it possible to activate a kind of TRIGGER, reacting on login
authentication?
Thanks in advance
Alberto 2 3265
If you right-click on the server name in enterprise manager (EM) and click
on properties, click on the SECURITY TAB.
You can then audit sucessfull logins, login failures, or all. There is only
2 things you have to remember.
1. You will have to read either the SQL server error log or the Application
log of Windows.
2. If people use generic logins or shared logins, you might not be able to
detect who it was that logged in.
Hope this helps
Oscar...
"Albe V°" <va*****************@hotmail.com> wrote in message
news:JA**********************@twister2.libero.it.. . On a huge Sql-Server 7 installation, we have various client applications distributed along the Lan, accessing one main database.
Each application accesses the db using one out of around ten logins. Most
of them, have only DBDataReader right on the db, as they are consultation consolles only.
In order to monitor db usage, the customer requires some kind of log of
user access.
My need, mainly, is to INSERT a record into a log table, recording Date, Time, Login, Host of each access.
But, and this is the problem, the job has to be done by the server itself, not by each client, because of various reasons: 1) we don't like to increase rights of logins 2) we don't plan to change anything in our custom client application 3) few of those client applications have been developed by foreign suppliers, so we cannot change them.
My question is: does it exist any kind of authentication LOG, which I can work on? Or, is it possible to activate a kind of TRIGGER, reacting on login authentication?
Thanks in advance
Alberto
Albe V° (va*****************@hotmail.com) writes: On a huge Sql-Server 7 installation, we have various client applications distributed along the Lan, accessing one main database.
Each application accesses the db using one out of around ten logins. Most of them, have only DBDataReader right on the db, as they are consultation consolles only.
In order to monitor db usage, the customer requires some kind of log of user access.
My need, mainly, is to INSERT a record into a log table, recording Date, Time, Login, Host of each access.
The best tool for this is the SQL Profiler. Set up a trace that captures
login events. I don't have the SQL7 docs available, so I prefer to not
give any details, but refer you to Books Online. On SQL2000 you can set
C2 auditing, which enures that you don't loose events if the log runs
out of disk space. (That throttles the server instead.) But I don't think
C2 is available on SQL7. Then again, with only ten users, you are not
likely to fill the log if you only filter logins.
Beware, though, that applications that may be written so that they
connect and reconnect frequently, for instance once per query.
--
Erland Sommarskog, SQL Server MVP, so****@algonet.se
Books Online for SQL Server SP3 at http://www.microsoft.com/sql/techinf...2000/books.asp This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: Dave |
last post by:
I am doing a complete backup on a sql 7 db and then doing a complete
restore (with overwrite existing db) on a sql 2000 server. This is now
our hot standby server. I have the process automated and...
|
by: Len Svitenko |
last post by:
How can I get a list of all SQL server logins that are on a given sql
server? What sql query would get me that? Or is there an sp that
gives me that. Also, if it could list what db they have...
|
by: David McGeorge |
last post by:
I am confused about windows account, win dimain account, sql login
accoun and sql database user account.... can you give me a fresh
example to show the exact relationship between them and how they...
|
by: tchangmian |
last post by:
Hi, I would like to create an auto-lock out module where users are
unable to continue login attempt after 3-5 unsuccessful logins. In
addition, the user account are automatically suspended after...
|
by: mgPA |
last post by:
Short: How can I limit the number of concurrent logins to Access
(2000) DB?
Long: I seem to be having the problem discussed in previous postings
of having more than 9 or 10 concurrent logins. ...
|
by: Burt |
last post by:
Hi All,
I need to develop an C# internet app with logins, eg you create a
username and password, the password can be emailed to you if you forget
it, you can change the password etc.
Before I...
|
by: happyjenny52 |
last post by:
Hi,
I work as an IT Administrator and part of my job role is to use
Enterprise Manager and Query Analyzer to backup the logins and
permissions for each database on our SQL Servers. This...
|
by: Simon Gorski |
last post by:
I have a large problem, and I believe there is not yet a way to solve this
using IIS and ASP.NET. I hope someone has a solution which we couldn't
find.
The current situation
When a user logs...
|
by: Inna |
last post by:
Hello all,
I am looking for the script, which I believe exists already.I need to
be able to populate the script for security of one database and
apply it to another database, even if it is located...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
| |