Documente Academic
Documente Profesional
Documente Cultură
In this article:
This article describes the accounts that that you must plan for and describes the deployment scenarios
that affect account requirements.
Use this article with the following planning tool: Windows SharePoint Services security account
requirements [ http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409 ] (http://go.microsoft.com/
fwlink/?LinkId=92885&clcid=0x409). This planning tool lists the requirements for each account based on
the deployment scenario. The requirements are also listed in the Technical reference: Account
requirements by scenario section of this article.
The account requirements detail the specific permissions that you need to grant prior to running Setup. In
some cases, additional permissions that are automatically granted by running Setup are noted in the
planning tool.
This article does not describe security roles and permissions required to administer Windows SharePoint
Services 3.0. For more information, see Plan for security roles (Windows SharePoint Services) [ http://
technet.microsoft.com/en-us/library/cc288186(office.12).aspx ] .
This section lists and describes the accounts that you must plan for. The accounts are grouped according
to scope. If an account has a limited scope, you might need to plan multiple accounts for this category.
After you complete installation and configuration of accounts, ensure that you do not use the Local
System account to perform administration tasks or to browse sites. For example, do not use the same
account that is used to run Setup to perform administration tasks.
The following table describes the accounts that are used to configure Microsoft SQL Server database
software and to install Windows SharePoint Services 3.0.
Account Purpose
SQL Server service account SQL Server prompts for this account during SQL Server Setup. This account is
used as the service account for the following SQL Server services:
● MSSQLSERVER
● SQLSERVERAGENT
If you are not using the default instance, these services will be shown as:
● MSSQL$InstanceName
● SQLAgent$InstanceName
Server farm account This account is also referred to as the database access account.
● The process account for the Windows SharePoint Services Timer service.
The following table describes the accounts that are used to set up and configure Windows SharePoint
Services Search.
Account Purpose
Windows SharePoint Services Search service account Used as the service account for the Windows SharePoint
Services Search service. There is one instance of this
service on each search server. Typically, a server farm
will include only one search server.
Windows SharePoint Services Search content access Used by the Windows SharePoint Services Search
account application server role to crawl content across sites.
If you create additional application pools to host sites, plan for additional application pool identity
accounts. The following table describes the application pool identity account. Plan one application pool
account for each application pool you plan to implement.
Account Purpose
Application pool identity The user account that the worker processes that service the application pool use as
their process identity. This account is used to access content databases associated
with the Web applications that reside in the application pool.
If you are deploying to a single server computer, account requirements are greatly reduced. In an
evaluation environment, you can use a single account for all of the account purposes. In a production
environment, ensure that the accounts you create have the appropriate permissions for their purposes.
For a list of account permissions for single server environments, see the Windows SharePoint Services
security account requirements [ http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409 ] (http://go.
microsoft.com/fwlink/?LinkId=92885&clcid=0x409) planning tool, or view the requirements listed in the
Technical reference: Account requirements by scenario section of this article.
If you are deploying to more than one server computer, use the server farm standard requirements to
ensure that accounts have the appropriate permissions to perform their processes across multiple
computers. The server farm standard requirements detail the minimum configuration that is necessary to
operate in a server farm environment. For a more secure environment, consider using the least privilege
administration requirements using domain user accounts.
For a list of standard requirements for server farm environments see the Windows SharePoint Services
security account requirements [ http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409 ] (http://go.
microsoft.com/fwlink/?LinkId=92885&clcid=0x409) planning tool, or view the requirements listed in the
Technical reference: Account requirements by scenario section of this article.
For some accounts, additional permissions or access to databases are configured when you run Setup.
These are noted in the accounts planning tool. An important configuration for database administrators to
be aware of is the addition of the WSS_Content_Application_Pools database role. Setup adds this role
to the following databases:
● SharePoint_AdminContent database
Members of the WSS_Content_Application_Pools database role are granted the Execute permission to
a subset of the stored procedures for the database. Additionally, members of this role are granted the
Select permission to the Versions table (dbo.Versions) in the SharePoint_AdminContent database.
For other databases, the accounts planning tool indicates that access to read from these databases is
automatically configured. In some cases, limited access to write to a database is also automatically
configured. To provide this access, permissions to stored procedures are configured. For the
SharePoint_Config database, for example, access to the following stored procedures is automatically
configured:
● proc_dropEmailEnabledList
● proc_dropEmailEnabledListsByWeb
● proc_dropSiteMap
● proc_markForDeletionEmailEnabledList
● proc_markForDeletionEmailEnabledListsBySite
● proc_markForDeletionEmailEnabledListsByWeb
● proc_putDistributionListToDelete
● proc_putEmailEnabledList
● proc_putSiteMap
Least privilege administration is a recommended security practice in which each service or user is
provided with only the minimum privileges needed to accomplish the tasks they are authorized to
perform. This means that each service is granted access to only the resources that are necessary to its
purpose. The minimum requirements to achieve this design goal include the following:
By using separate service accounts for each service and limiting the permissions assigned to each
account, you reduce the opportunity for a malicious user or process to compromise your environment.
Least privilege administration with domain user accounts is the recommended configuration for most
environments.
For a list of least privilege administration requirements with domain user accounts, see the Windows
SharePoint Services security account requirements [ http://go.microsoft.com/fwlink/?
LinkId=92885&clcid=0x409 ] (http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409) planning tool,
or view the requirements listed in the Technical reference: Account requirements by scenario section of
this article.
In environments where SQL authentication is a requirement, you can follow the principle of least privilege
administration. In this scenario:
● All other administration and service accounts are created as domain user accounts.
● All database accounts must be created as SQL Server login accounts in SQL Server 2000 Enterprise
Manager or SQL Server 2005 Management Studio. These accounts must be created before the
creation of any databases, including the configuration database and the AdminContent database.
● You must use the Psconfig command-line tool to create the configuration database and the
SharePoint_AdminContent database. You cannot use the SharePoint Products and Technologies
Configuration Wizard to create these databases. To create a farm or to join a computer to a farm,
specify the SQL Server login that you created for these databases as the dbusername and
dbpassword. The same SQL Server login is used to access both databases.
● You can create additional content databases in Central Administration by selecting the SQL
authentication option. However, you must first create the SQL Server login accounts in SQL
Server 2000 Enterprise Manager or SQL Server 2005 Management Studio.
● Secure all communication with the database servers by using Secure Sockets Layer (SSL) or
Internet Protocol security (IPsec).
● SQL Server login accounts are encrypted in the registry of the Web servers and application servers.
● The server farm account is not used to access the configuration database and the
SharePoint_AdminContent database. The corresponding SQL Server login accounts are used instead.
For a list of least privilege administration requirements with SQL authentication, see the Windows
SharePoint Services security account requirements [ http://go.microsoft.com/fwlink/?
LinkId=92885&clcid=0x409 ] (http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409) planning tool,
or view the requirements listed in the Technical reference: Account requirements by scenario section of
this article.
Before creating databases, create SQL Server logins for each of the databases. Two logins are created for
the configuration and SharePoint_AdminContent databases. Create one login for each content database.
The following table lists the logins that must be created. The Login column indicates the account that is
specified or created for the SQL Server login. For the first login, you must enter the Setup user account.
For all other logins, you create a new SQL Server login account. For these logins, the Login column
provides an example account name.
In environments where databases are pre-created by a database administrator, you can follow the
principle of least privilege administration. In this scenario:
● SQL Server logins are created for the accounts that are used to configure databases.
For more information about deploying Windows SharePoint Services 3.0 using pre-created blank
databases, see Deploy using DBA-created databases (Windows SharePoint Services) [ http://technet.
microsoft.com/en-us/library/cc288606(office.12).aspx ] .
For a list of least privilege administration requirements when connecting to an existing blank database,
see the Windows SharePoint Services security account requirements [ http://go.microsoft.com/fwlink/?
LinkId=92885&clcid=0x409 ] (http://go.microsoft.com/fwlink/?LinkId=92885&clcid=0x409) planning tool,
or view the requirements listed in the Technical reference: Account requirements by scenario section of
this article.
Before creating databases, create SQL Server logins for each of the accounts that will access the
databases. The accounts planning tool details the specific permissions that are configured for each
account. For instructions on how to create and grant permissions to databases, see Deploy using DBA-
created databases (Windows SharePoint Services) [ http://technet.microsoft.com/en-us/library/cc288606
(office.12).aspx ] .
The following table lists the logins that must be created. The database column indicates which databases
are configured with permissions for each login account. For each login, specify Windows authentication
when creating the login.
Login Database
● Configuration database
● SharePoint_AdminContent database
Account Requirements
Setup user account Member of the Administrators group on the local computer
Account Requirements
Windows SharePoint Services Search By default, this account runs as the Local System account.
service account
Windows SharePoint Services Search Must not be a member of the Farm Administrators group.
content access account
The following are automatically configured:
● Added to the Web application Full Read policy for the farm.
Account Requirements
The Network Service account is used for the default Web site that is created during
Setup and configuration.
Account Requirements
SQL Server service account Use either a Local System account or a domain user account.
If you run Stsadm commands that affect a database, this account must be a
member of the db_owner fixed database role for the database.
Additional permissions are automatically granted for this account on Web servers
and application servers that are joined to a server farm.
This account is automatically added as a SQL Server login on the computer running
SQL Server and added to the following SQL Server security roles:
● db_owner fixed database role for all databases in the server farm
Note if you configure the Microsoft Single Sign-On Service, the server farm
account will not automatically be given db_owner access to the SSO database
Account Requirements
service account.
● Added to the Web application Full Read policy for the farm.
Account Requirements
SQL Server Use either a Local System account or a domain user Server farm standard requirements
service account account. with the following additions or
exceptions:
If a domain user account is used, this account uses
Kerberos authentication by default, which requires
Use a separate domain user
additional configuration in your network
●
exceptions:
● Member of the Administrators group on each
server on which Setup is run.
● Use a separate domain user
● SQL Server login on the computer running account.
SQL Server.
● This account should NOT be a
● Member of the following SQL Server security member of the Administrators
roles: group on the computer running
SQL Server.
❍ securityadmin fixed server role
exceptions:
● If the server farm is a child farm with Web
applications that consume shared services
● Use a separate domain user
from a parent farm, this account must be a
account.
member of the db_owner fixed database role
on the configuration database of the parent
● NOT a member of the
farm.
Administrators group on any
server in the server farm,
Additional permissions are automatically granted for including the computer running
this account on Web servers and application servers
SQL Server.
that are joined to a server farm.
This account is automatically added as a SQL Server ● This account does not require
login on the computer running SQL Server and added permissions to SQL Server
to the following SQL Server security roles: before creating the
configuration database.
● dbcreator fixed server role
Least-privilege using
domain user accounts
Account Server farm standard requirements requirements
● Access to read from the configuration and ● This account should not be a
the SharePoint_AdminContent databases. member of the Administrators
group on any computer in the
● Additional permissions for this account to server farm.
front-end Web servers and application
servers are automatically granted.
SQL Server Use either a Local System account or a domain Server farm standard requirements with the
service user account. following additions or exceptions:
account
If a domain user account is used, this account
Use a separate domain user account.
uses Kerberos authentication by default, which
●
● SQL Server login on the computer ● SQL Server login on the SQL Server
running SQL Server. computer.
● Member of the following SQL Server ● NOT a member of the following SQL
security roles: Server security roles:
If you run Stsadm commands that affect a ● NOT a member of the Administrators
database, this account must be a member of group on the computer running SQL
the db_owner fixed database role for the Server.
database.
Note:
service account
● Must not be a member of the Farm
Administrators group. ● Use a separate domain user
account.
Least-privilege when
connecting to pre-created
Account Server farm standard requirement databases requirements
SQL Server Use either a Local System account or a domain user Server farm standard requirements
service account account. with the following additions or
exceptions:
If a domain user account is used, this account uses
Kerberos authentication by default, which requires
Use a separate domain user
additional configuration in your network
●
exceptions:
● Member of the Administrators group on each
server on which Setup is run.
● Use a separate domain user
● SQL Server login on the computer running account.
SQL Server.
● NOT a member of the
● Member of the following SQL Server security Administrators group on the
roles: computer running SQL Server.
exceptions:
● If the server farm is a child farm with Web
applications that consume shared services
● Use a separate domain user
from a parent farm, this account must be a
account.
member of the db_owner fixed database role
on the configuration database of the parent
● NOT a member of the
farm.
Administrators group on any
server in the server farm,
Additional permissions are automatically granted for including the computer running
this account on Web servers and application servers
SQL Server.
that are joined to a server farm.
This account is automatically added as a SQL Server ● This account does not require
login on the computer running SQL Server and added permissions to SQL Server
to the following SQL Server security roles: before creating the
configuration database.
● dbcreator fixed server role
After the Shared Services Provider
● securityadmin fixed server role (SSP) database and the SSP search
database are created, add this account
● db_owner fixed database role for all to the following for each of these
databases in the server farm databases:
service account
● Must not be a member of the Farm
Administrators group. ● Use a separate domain user
account.
● Membership in the db_owner role for ● Users group and db_owner role
the Windows SharePoint Services for the WSS_Search database.
Search database.
● Users group in the configuration
database.
Least-privilege when
connecting to pre-created
Account Server farm standard requirement databases requirements
● Access to read from the configuration and ● This account should not be a
the SharePoint_AdminContent databases. member of the Administrators
group on any computer in the
● Additional permissions for this account to server farm.
front-end Web servers and application
servers are automatically granted.
After the SSP database and the SSP
search database are created, add
this account to the following for each
of these databases:
● Users group
● db_owner role
This topic is included in the following downloadable book for easier reading and printing:
● Planning and architecture for Windows SharePoint Services 3.0, part 2 [ http://go.microsoft.com/
fwlink/?LinkID=85553 ]
See the full list of available books at Downloadable books for Windows SharePoint Services [ http://go.
microsoft.com/fwlink/?LinkId=81199 ] .
See Also
Concepts
Plan for security roles (Windows SharePoint Services) [ http://technet.microsoft.com/en-us/library/
cc288186(office.12).aspx ]