Security

Guides for all SentryOne software (SQL Sentry) security topics (e.g. rights-based, role-based, the monitoring service and client, Azure, pass-through authentication, monitoring across domains, and more).

Articles

Security Overview
Security covers the following topics relating to SentryOne security, including required permissions for the various SentryOne components:  Security Topic Description Monitoring Service Security This topic discusses the permissions ...
 Rights Based Security
Discusses restricting user access within the SentryOne client based on Windows and SQL Server authentication accounts.
 Role Based Security
Discusses restricting user access within the SentryOne client based on SentryOne database roles.
Monitoring Service Security
Guide to the permissions required by the SentryOne monitoring service account when watching targets.
Client Security
Guide to the permissions required when running the SentryOne client, including scenarios in which the client connects directly to a monitored target.
Watching Targets Across Domains
Overview of the options available for watching targets across domains, including information about Pass-through Authentication and configuring SentryOne sites within your environment.
Azure SQL Database and Data Warehouse Security
Covers security aspects specific to Azure SQL Database and SQL Data Warehouse.
Non-Windows Network Environment Security
Available options for watching instances in a non-Windows environment, including Pass-through Authentication.
Pass-through Authentication
Guide to Pass-through Authentication with SentryOne.
Performance Analysis Security Requirements
Advanced information about the Performance Analysis security requirements, including port requirements for monitored targets.