You may re-veriry how the front end is obtaining connection to the database. Indeed, the ideal way would be Windows Authentication and the logins you include as a part of the role are WINDOWS logins of the users.
The vision must be followed by the venture. It is not enough to stare up the steps - we must step up the stairs. - Vance Havner