About Roles

Administrator Account Permissions

Database Access Rights Needed for Neurons for ITSM

Database Access Rights Needed for the Reporting Feature

Administrator Account Permissions

Use your account that has local administrator permissions to install Neurons for ITSM, including all optional components. This administrator account must have permission to create and modify folders, files, and registry keys.

Database Access Rights Needed for Neurons for ITSM

The following are the minimum access rights required for the account of the user running the System Configuration Wizard:

Role Access Right
Server public
dbcreator

securityadmin

 

NOTE: This role is only needed temporarily, to assign the db_owner role to the configuration database and the Neurons for ITSM databases.

If you do not want to give this permission to the user running the System Configuration Wizard, you must go into the Microsoft SQL Server Management Studio and manually assign the service account as the db_owner for the configuration database and the Neurons for ITSM databases.

Database Access Rights Needed for the Reporting Feature

The following are the minimum access rights used in Microsoft SQL Server Management Studio for Neurons for ITSM when also using the reporting feature:

Role Access Right
Server public
dbcreator
securityadmin *
Database db_owner of master
db_owner of msdb

* The securityadmin role, and the db_owner of the master Microsoft database, are only needed if you set up Microsoft SSRS and create a new report server database. If you have already configured Microsoft SSRS and do not make any changes to it, you do not need this role.

 

The securityadmin role creates the following Microsoft SSRS-related roles in the master, msdb, report server, and report server temporary databases:

RSExecRole

SQLAgentOperatorRole

SQLAgentReaderRole

SQLAgentUserRole

The service account for Microsoft SSRS requires:

Database Role
MSDB RSExecRole
SQLAgentOperatorRole
SQLAgentReaderRole
SQLAgentUserRole
Master RSExecRole
Report server RSExecRole
db_owner
Report server temporary RSExecRole
db_owner