• The assumption that I made in that reply is that you are using Integrated Security rather than SQL Server Security. There are several advantages in that approach, less SQL Server administrative work, the ability to track a user when they roam, the ability to see the user in error logs, and the ability to track who changed what using triggers or other automation tools. Sorry I didn't think to add that in my last reply.

    Wendell
    Colorful Colorado
    You can't see the view if you don't climb the mountain!