- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
Here’s the situation: You’ve taken a backup of a database, and you’ve copied it to another server. Database Administrators do this all the time to have a production copy of data, to have a reporting database or for development and testing, or just to have a “warm standby” copy of the database ready to go.
But when you copy the database over to the other server, sometimes users can’t log on. In fact, they might get the error message:
Or even this one:
Or even worse the user gets in, but suddenly has more (or less) permissions than they used to! What’s going on here?
Using the troubleshooting checklist I described in another tutorial, you’ve identified the components in the system, and the only thing that has changed is the move itself. The user is still the user, the data is still the data. You don’t have any other issues, no hardware problems, and everything else seems to be working fine. Your next step is to try another user login to see if they also have the issue and sure enough, they do. The only common element is that “new” database copy.
You begin your investigation by checking the logins on the server. As you’ll recall from my discussion on security, there are actually two logins to a SQL Server database one for the server, and then another for the database. You open SQL Server Enterprise Manager (SQL Server 2000 and lower) or SQL Server Management Studio (SQL Server 2005 and higher) and check the server logins on the second, or destination server. Sure enough, all your users are there. Next you drill down to the databases, and – wait a minute the users are NOT there. This must be the problem.
So you right-click the Security node beneath the database name and select New User from the menu that pops up and you try to create the user. But when you do, you get one of these messages:
or:
or even:
So you try to use the sp_adduser Stored Procedure to create the user, or in SQL Server 2005 and higher the CREATE USER statement. Same errors!
OK, if they are already in the database (although they aren’t shown anywhere), you decide to delete the account in the database and re-add them. That’s a sound strategy. But when you try the sp_dropuser or DROP USER commands, you get the same error! What’s going on here?
The Problem
This problem is created because of the way SQL Server handles logins to the server and database, and the fact that Microsoft followed good database design principles. That’s right, because of Relational Database theory you’ve now got what is called an “orphaned login”. You’ll see why in a moment.
I’ll create a database, server login and database user on two test systems to show you the process, and if you like, you can follow along on your test systems as well. Don’t do this in production, of course!
On the first system, I’ll create a test database by running this code I’m using SQL Server 2008, but this will work with SQL Server 2005 as well. For SQL Server 2000, It’s only a matter of using a different set of table names that I’ll point out in a moment.
CREATE DATABASE Orphans; GO
Now I’ll create a new user (for SQL Server 2000, you use the sp_addlogin Stored Procedure):
USE [master] GO CREATE LOGIN [Bob] WITH PASSWORD=N'Pass@word1' , DEFAULT_DATABASE=[Orphans] , CHECK_EXPIRATION=OFF, CHECK_POLICY=OFF GO
So far, so good. Now I’ll change over to that database and add the server user to that database, and put the login in the db_datareader role so that they have the right to view data:
USE [Orphans] GO CREATE USER [Bob] FOR LOGIN [Bob] GO USE [Orphans] GO EXEC sp_addrolemember N'db_datareader' , N'Bob' GO
Now, I’ll backup the database to my TEMP directory, and then copy the backup file to my other server:
USE master; GO BACKUP DATABASE Orphans TO DISK = 'c:\temp\Orphans.bak' WITH INIT; GO
I’ll now log in to my second server, and restore the backup there. Since the driver letters and directories are the same on both test systems, that’s a pretty simple command – again, this is run on the second server after I copy the backup file over to its TEMP directory:
RESTORE DATABASE Orphans FROM DISK = 'c:\temp\Orphans.bak'; GO
Of course, you can do all this with the graphical tools as well, but I rely on scripts a great deal and of course they are more consistent in an explanation like this. Now, once again on the second server, I‘ll create that Bob login there:
USE [master] GO CREATE LOGIN [Bob] WITH PASSWORD=N'Pass@word1' , DEFAULT_DATABASE=[Orphans] , CHECK_EXPIRATION=OFF, CHECK_POLICY=OFF GO
Now all that’s left is to tell Bob to log into his application. He logs in, and gets the dreaded error messages from above. So I look in the graphical tools for Bob’s login in the database Security node, and sure enough, it isn’t shown. No worries, I’ll just create him on that second database:
USE [Orphans] GO CREATE USER [Bob] FOR LOGIN [Bob] GO USE [Orphans] GO EXEC sp_addrolemember N'db_datareader' , N'Bob' GO
Yikes! I get this message:
OK, now I’ve duplicated your problem, and we can spend some time on why it happens.
First, over on the original server, when I created the server user an entry was placed in the sys.syslogins table (or the sysxlogins table in SQL Server 2000 and lower). I can see that with this query, on the first server:
SELECT * FROM sys.syslogins WHERE name = 'Bob'; GO
Right there in the “name” column I see Bob. Remember from my series on SQL Server Security that you have the two logins – one to the server, the other to the database. So now I’ll look in the Orphans database for the logon there:
USE Orphans; GO SELECT * FROM sys.sysusers WHERE name = 'Bob' GO
And there’s i. Now, the key here is the Key. That is, just like you should do, Microsoft doesn’t rely on the “name” column to tie the sys.syslogins (server logins) and the sys.sysusers (database logons, sysxusers for SQL Server 2000) together. It uses a key in this case, a field called “sid” (for Security Identifier). You can see that when I tie Bob’s info together with this query:
SELECT a.name AS 'Server Name' , a.sid AS 'Server ID' , b.name AS 'Database Name' , b.sid AS 'Database ID' FROM master.sys.syslogins a INNER JOIN Orphans.sys.sysusers b ON a.sid = b.sid WHERE a.name = 'Bob'; GO
In fact, this is exactly what the graphical tool is doing to show you the users in the database it runs a query just like this one. You can see that the two sid’s, from the server and database queries, are identical, and you get data back from the query.
Now I’ll switch over to the second server to run exactly the same three queries. The first one, from the server logins (master.sys.syslogins) shows me this sid for the Bob login in my environment:
0x3618F8C27389784DBEDFED5EE811FF58
But the database logins (Orphans.sys.sysusers) has this sid:
0xC158D6E576DF3C46B30582BD891A4332
Ah when I look carefully, I see that the sid in the database came over with the backup! That’s the problem the master database on the first server has the same sid value as the Orphans database values, but the master database on my second system has a different sid for Bob (even though the name is the same) than what came over in the backup file.
So if that’s the case, why can’t I just drop the Bob user in the database and recreate it? Well, there are two reasons. For one, the logins are tied, so when the graphical tools and functions try to delete the user, they check the name field in the master database and find that there is a match, so they fail. They don’t want to create an “orphaned” user this way.
The second reason you don’t want to just drop the login is that it probably has a lot of security tied to it it might own objects, it has rights to read or write to various tables, it has permissions on Stored Procedures and so on. Multiply that by dozens of users, and you’ve got a lot of work to do if it goes away plus, you could get all that wrong and really cause an issue.
The Fix
Now that you understand the problem, how do you fix it? It actually all comes down to just making the sid’s on the two databases, master and Orphans, identical. Simple, right?
Well, not really. As you’re probably aware, the “sys” schema I’ve been using here (and the sysxlogins tables in SQL Server 2000 and lower) are actually not accessible, for very good reasons, to be easily modified. You can’t just use an UPDATE statement against the tables.
Microsoft has provided an easier fix, which works in most situations. I’ll give you a link at the bottom for those situations that are a little more difficult or involved, but you should try this solution first.
It’s a simple stored procedure, which has three “modes”. The first is to report any problems, the second is to fix a single login, and the other is to fix any logins it can automatically. Let’s take a quick look at each.
The stored procedure is called sp_change_users_login. I’ll run it in the first mode to see if it catches the Bob orphaned login on the second server. I need to be in the database context that I want to check, so first I’ll use the Orphans database. From there, I just run the Stored Procedure and give it one parameter: Report. It looks like this:
USE Orphans; GO EXEC sp_change_users_login 'Report'; GO
It finds that the Bob login is indeed orphaned it exists in both databases, but with the wrong sid. To fix the problem, I could use another option for the stored Procedure by sending the “Auto” parameter, like this:
USE Orphans; GO EXEC sp_change_users_login 'Auto_Fix'; GO
The Auto parameter simply looks for all the same names in the master database and the database you’re in and ties them together. I don’t normally use this method I find the orphans and then fix them one at a time. It takes longer, but unless I have thousands of logins, I like having this level of control. To fix just one login, I use two parameters the database login name and the server login name that I want to fix, like this:
USE Orphans; GO EXEC sp_change_users_login 'Update_one’, ‘Bob’, ‘Bob’; GO
And there you have it all fixed up. I can run the query that joins the two databases again, and now I see that Bob shows up, and also that the database logon shows up in the graphical tools as well.
You can take pro-active steps to prevent this from happening in the future. First, you can use Database Roles for the security, which is a best practice, and then just run a set of database logon scripts to place the users in the right groups. Database Roles are kept within the database, so you don’t have to worry about that server connection.
Another method is to “build” the database rather than copying it. From then on, you just use Microsoft Data Transformation Services (DTS) or SQL Server Integration Services (SSIS) to transfer the data and database objects to keep them in synch. This is the method I use for my reporting, testing and development servers.
InformIT Articles and Sample Chapters
If you’re interested in learning more about Database Roles, I cover that in this overview: SQL Server Security – Roles.
Books and eBooks
Security is a big topic, and I cover it in more depth in my Administrator’s Guide to SQL Server 2005. It’s still pretty valid even for SQL Server 2008.
Online Resources
There are a few restrictions on the stored procedures and methods I’ve shown you in this tutorial. If these processes do not work for you, then check here for more information.