Best practices SQL domain accounts and permissions

Is it best practice to run the MSSQL2012 service using an active directory domain account instead of the default (local computer service account)?

My understanding of Windows Server security and general security is that I should give the AD user only the exact permissions necessary (instead of just giving it blanket permissions like putting it into the Domain Admins Security Group). What are the actual permissions required for said AD user account for running the service and SQL to be able to correctly run?

One of the errors I keep getting is that the servicenameprotocol isn't registering, I've been through all the KB's and none of the answers solve my problem (I've done all the manual setSPN.exe commands, I've given permission on the 'read serviceprincipalname' and 'write serviceprincipalname' fields). When I give the service account Domain Admin permissions, the error goes away therefore I know that this is a permissions issue for the AD user account.

Cheers,

Jeff



June 28th, 2015 9:38pm

Hello,

If the service account does not have permissions you can try a manual registration as explained on the following article:

https://msdn.microsoft.com/en-us/library/ms191153(v=sql.110).aspx


About the permissions required to register a SPN, please read the following resource:

https://msdn.microsoft.com/en-us/library/ms191153(v=sql.110).aspx#Permissions


Usually we choose a domain account as SQL Server service account if the SQL Server needs access to domain resources.



Hope this helps.



Regards,

Alberto Morillo
SQLCoffee.com


Free Windows Admin Tool Kit Click here and download it now
June 28th, 2015 10:52pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics