{"id":1879,"date":"2013-04-15T05:34:16","date_gmt":"2013-04-15T05:34:16","guid":{"rendered":"https:\/\/poiseddevelopers.com\/reality-tech\/?p=1879"},"modified":"2024-05-06T12:30:04","modified_gmt":"2024-05-06T12:30:04","slug":"granting-sharepoint-shell-administration-access","status":"publish","type":"post","link":"https:\/\/poiseddevelopers.com\/reality-tech\/granting-sharepoint-shell-administration\/","title":{"rendered":"Granting SharePoint Shell Administration access"},"content":{"rendered":"<h2>Granting SharePoint Shell Administration access via PowerShell<\/h2>\n<p>Enabling a PowerShell user can be as simple as granting local admin rights and the following command:<\/p>\n<pre lang=\"php\">add-spshelladmin \"DOMAIN\\USER\"\r\n<\/pre>\n<p>Sometimes though there remain Content DBs for which the user doesn\u2019t gain PowerShell access. In this case, the following command pipes in the content DBs and forces the PowerShell access granted:<\/p>\n<pre lang=\"php\">get-spcontentdatabase | add-spshelladmin \"DOMAIN\\USER\"\r\n<\/pre>\n<p>There are service application databases as well, and these could be all handled with this single command:<\/p>\n<pre lang=\"php\">get-spdatabase | add-spshelladmin \"DOMAIN\\USER\"\r\n<\/pre>\n<p>In the end what is required is the user having Security admin server role access on the SQL instance and the db_owner role in a database.<\/p>\n<p>The security Admin role is required so that the underlying service accounts get granted the appropriate permissions, say when mounting a content DB.<\/p>\n<p>Also a user must be a member of the SharePoint_Shell_Access role on the configuration database and a member of the WSS_ADMIN_WPG local group on the server (actually best to do on each server in the farm).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Granting SharePoint Shell Administration access via PowerShell Enabling a PowerShell user can be as simple as granting local admin rights and the following command: add-spshelladmin &#8220;DOMAIN\\USER&#8221; Sometimes though there remain Content DBs for which the user doesn\u2019t gain PowerShell access. In this case, the following command pipes in the content DBs and forces the PowerShell [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":1881,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-powershell"],"acf":[],"_links":{"self":[{"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/posts\/1879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/comments?post=1879"}],"version-history":[{"count":2,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/posts\/1879\/revisions"}],"predecessor-version":[{"id":3556,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/posts\/1879\/revisions\/3556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/media\/1881"}],"wp:attachment":[{"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/media?parent=1879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/categories?post=1879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/poiseddevelopers.com\/reality-tech\/wp-json\/wp\/v2\/tags?post=1879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}