forked from dsccommunity/SqlServerDsc
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path1-UseParameterPermission.ps1
70 lines (67 loc) · 2.04 KB
/
1-UseParameterPermission.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
<#
.DESCRIPTION
This example shows how to ensure that the login "NT AUTHORITY\SYSTEM" and
"NT SERVICE\ClusSvc" is granted "AlterAnyAvailabilityGroup" and "ViewServerState"
permissions.
#>
Configuration Example
{
param
(
[Parameter(Mandatory = $true)]
[System.Management.Automation.PSCredential]
$SqlAdministratorCredential
)
Import-DscResource -ModuleName 'SqlServerDsc'
node localhost
{
SqlPermission 'SQLConfigureServerPermission-SYSTEM'
{
ServerName = 'sql01.company.local'
InstanceName = 'DSC'
Name = 'NT AUTHORITY\SYSTEM'
Credential = $SqlAdministratorCredential
Permission = @(
ServerPermission
{
State = 'Grant'
Permission = @('AlterAnyAvailabilityGroup', 'ViewServerState')
}
ServerPermission
{
State = 'GrantWithGrant'
Permission = @()
}
ServerPermission
{
State = 'Deny'
Permission = @()
}
)
}
SqlPermission 'SQLConfigureServerPermission-ClusterSvc'
{
ServerName = 'sql01.company.local'
InstanceName = 'DSC'
Name = 'NT SERVICE\ClusSvc'
Credential = $SqlAdministratorCredential
Permission = @(
ServerPermission
{
State = 'Grant'
Permission = @('AlterAnyAvailabilityGroup', 'ViewServerState')
}
ServerPermission
{
State = 'GrantWithGrant'
Permission = @()
}
ServerPermission
{
State = 'Deny'
Permission = @()
}
)
}
}
}