Assuming the server is setup in a way that the account/workstation has elevated privileges to be able to handle the different queries/access that teams require. Since the server account has elevated user priveleges, what's the method to prevent the following:
- Accessing a file location on a network drive location via server that they normally would not have access to in desktop designer
- Malicious/Careless SQL commands that when done locally on the users machine will not work, but through the elevate service account will
- Other cases where a user can access data they normally wouldn't be able to since server is using an elevated service account
I don't know the technical terminology for much of these issues, but it is a thought that has cross my mind for the possibility of implementing server at an enterprise level. Would we need separate service accounts based on user groups through server? I could see this requiring a lot of maintenance on a go-forward basis.
What I am imagining is Windows Integrated Authentication but on a user level within server.