• EricEyster (2/25/2014)


    I highly recommend using database roles for this requirement. Assign the permissions to the role and the next time around you just add the user to the role.

    Another suggestion that could be useful is to use impersonation...