Figuring out agent security is not easy because there are so many different situations that you need to consider while troubleshooting a problem. The following tables should help you identify when the agent security is enforced, and whose rights are used to authenticate the access rights. Note that the tables below apply to personal and shared agents.
Table 1. Where agents can run
This table identifies the four valid situations where agents can run. The rest of the tables expand on the information included in this first one -- that is, for where an agent can run (where the value is "yes"), the rest of the tables explain the corresponding agent restrictions, database ACL rights, embedded agent rules, and whether the agent can access databases on other servers. |