• The one's that are essentially log shipped are going to be tougher, because you can't modify the database target in any way. The ones that are mirrored are somewhat easier, but I am pretty sure security changes on the source will be propagated to the mirror.

    I think Perry is on to something with what logins are present on the server. If you are using AD accounts or groups you it would be easier. For SQL logins you would need to make sure that SIDs on the other servers match up otherwise the security won't flow.

    Interesting idea..

    CEWII