-
Notifications
You must be signed in to change notification settings - Fork 225
SqlDatabaseUser
Parameter | Attribute | DataType | Description | Allowed Values |
---|---|---|---|---|
Name | Key | String | Specifies the name of the database user to be added or removed. | |
InstanceName | Key | String | Specifies the SQL Server instance in which the database exist. | |
DatabaseName | Key | String | Specifies the name of the database in which to configure the database user. | |
ServerName | Write | String | Specifies the host name of the SQL Server on which the instance exist. Default value is the current computer name. | |
LoginName | Write | String | Specifies the name of the login to associate with the database user. This must be specified if parameter UserType is set to 'Login' . |
|
AsymmetricKeyName | Write | String | Specifies the name of the asymmetric key to associate with the database user. This must be specified if parameter UserType is set to 'AsymmetricKey' . |
|
CertificateName | Write | String | Specifies the name of the certificate to associate with the database user. This must be specified if parameter UserType is set to 'Certificate' . |
|
UserType | Write | String | Specifies the type of the database user. Default value is 'NoLogin' . |
Login , NoLogin , Certificate , AsymmetricKey
|
Ensure | Write | String | Specifies if the database user should be present or absent. If 'Present' then the database user will be added to the database and, if needed, the login mapping will be updated. If 'Absent' then the database user will be removed from the database. Default value is 'Present' . |
Present , Absent
|
Force | Write | Boolean | Specifies if it is allowed to re-create the database user if either the user type, the asymmetric key, or the certificate changes. Default value is $false not allowing database users to be re-created. |
|
AuthenticationType | Read | String | Returns the authentication type of the login connected to the database user. This will return either 'Windows' , 'Instance' , or 'None' . The value 'Windows' means the login is using Windows Authentication, 'Instance' means that the login is using SQL Authentication, and 'None' means that the database user have no login connected to it. |
|
LoginType | Read | String | Returns the login type of the login connected to the database user. If no login is connected to the database user this returns $null . |
|
DatabaseIsUpdateable | Read | Boolean | Returns if the database is updatable. If the database is updatable, this will return $true . Otherwise it will return $false . |
The SqlDatabaseUser
DSC resource is used to create database users.
A database user can be created with or without a login, and a database
user can be mapped to a certificate or asymmetric key. The resource also
allows re-mapping of the SQL login. If the targeted database is not updatable,
the resource returns true.
Note
This resource does not yet support Contained Databases.
- Target machine must be running Windows Server 2012 or later.
- Target machine must be running SQL Server Database Engine 2012 or later.
All issues are not listed here, see here for all open issues.
This example shows how to ensure that the database users ReportAdmin, CONTOSO\ReportEditors, and CONTOSO\ReportViewers are present in the AdventureWorks database in the instance sqltest.company.local\DSC.
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlDatabaseUser 'ReportAdmin_AddUser'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'ReportAdmin'
UserType = 'Login'
LoginName = 'ReportAdmin'
PsDscRunAsCredential = $SqlAdministratorCredential
}
SqlDatabaseUser 'ContosoReportEditor_AddUser'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'CONTOSO\ReportEditor'
UserType = 'Login'
LoginName = 'CONTOSO\ReportEditor'
PsDscRunAsCredential = $SqlAdministratorCredential
}
SqlDatabaseUser 'ContosoReportViewer_AddUser'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'CONTOSO\ReportViewer'
UserType = 'Login'
LoginName = 'CONTOSO\ReportViewer'
PsDscRunAsCredential = $SqlAdministratorCredential
}
}
}
This example shows how to ensure that the database user User1 are present in the AdventureWorks database in the instance sqltest.company.local\DSC.
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlDatabaseUser 'AddUser1'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'User1'
PsDscRunAsCredential = $SqlAdministratorCredential
}
}
}
This example shows how to ensure that the database user User1 are mapped to the asymmetric key Key1 in the AdventureWorks database in the instance sqltest.company.local\DSC.
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlDatabaseUser 'ReportAdmin_AddUser'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'ReportAdmin'
UserType = 'AsymmetricKey'
AsymmetricKeyName = 'Key1'
PsDscRunAsCredential = $SqlAdministratorCredential
}
}
}
This example shows how to ensure that the database user User1 are mapped to the certificate Certificate1 in the AdventureWorks database in the instance sqltest.company.local\DSC.
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlDatabaseUser 'ReportAdmin_AddUser'
{
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'ReportAdmin'
UserType = 'Certificate'
CertificateName = 'Certificate1'
PsDscRunAsCredential = $SqlAdministratorCredential
}
}
}
This example shows how to ensure that the database user CONTOSO\ReportViewers is absent from the AdventureWorks database in the instance sqltest.company.local\DSC.
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlDatabaseUser 'ContosoReportViewer_RemoveUser'
{
Ensure = 'Absent'
ServerName = 'sqltest.company.local'
InstanceName = 'DSC'
DatabaseName = 'AdventureWorks'
Name = 'CONTOSO\ReportViewer'
PsDscRunAsCredential = $SqlAdministratorCredential
}
}
}
- Add-SqlDscNode
- Add-SqlDscTraceFlag
- Complete-SqlDscFailoverCluster
- Complete-SqlDscImage
- Connect-SqlDscDatabaseEngine
- ConvertFrom-SqlDscDatabasePermission
- ConvertFrom-SqlDscServerPermission
- ConvertTo-SqlDscDatabasePermission
- ConvertTo-SqlDscServerPermission
- Disable-SqlDscAudit
- Disconnect-SqlDscDatabaseEngine
- Enable-SqlDscAudit
- Get-SqlDscAudit
- Get-SqlDscConfigurationOption
- Get-SqlDscDatabasePermission
- Get-SqlDscManagedComputer
- Get-SqlDscManagedComputerService
- Get-SqlDscPreferredModule
- Get-SqlDscServerPermission
- Get-SqlDscStartupParameter
- Get-SqlDscTraceFlag
- Import-SqlDscPreferredModule
- Initialize-SqlDscRebuildDatabase
- Install-SqlDscServer
- Invoke-SqlDscQuery
- New-SqlDscAudit
- Remove-SqlDscAudit
- Remove-SqlDscNode
- Remove-SqlDscTraceFlag
- Repair-SqlDscServer
- Save-SqlDscSqlServerMediaFile
- Set-SqlDscAudit
- Set-SqlDscDatabasePermission
- Set-SqlDscServerPermission
- Set-SqlDscStartupParameter
- Set-SqlDscTraceFlag
- Test-SqlDscIsDatabasePrincipal
- Test-SqlDscIsLogin
- Test-SqlDscIsSupportedFeature
- Uninstall-SqlDscServer
- SqlAG
- SqlAGDatabase
- SqlAgentAlert
- SqlAgentFailsafe
- SqlAgentOperator
- SqlAGListener
- SqlAGReplica
- SqlAlias
- SqlAlwaysOnService
- SqlAudit
- SqlConfiguration
- SqlDatabase
- SqlDatabaseDefaultLocation
- SqlDatabaseMail
- SqlDatabaseObjectPermission
- SqlDatabasePermission
- SqlDatabaseRole
- SqlDatabaseUser
- SqlEndpoint
- SqlEndpointPermission
- SqlLogin
- SqlMaxDop
- SqlMemory
- SqlPermission
- SqlProtocol
- SqlProtocolTcpIp
- SqlReplication
- SqlRole
- SqlRS
- SqlRSSetup
- SqlScript
- SqlScriptQuery
- SqlSecureConnection
- SqlServiceAccount
- SqlSetup
- SqlTraceFlag
- SqlWaitForAG
- SqlWindowsFirewall