473,407 Members | 2,314 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,407 software developers and data experts.

How To Create Login Password Protected Database

Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
....
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 2 '06 #1
6 3131
Access supports workgroup security files. This allows you to create users,
groups and assign security to the database objects even at the field level.
Once the workgroup file is setup, you can then provide a simple interface in
your application to prompt the user for the login information. The security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol.com> wrote in message
news:11*********************@g10g2000cwb.googlegro ups.com...
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 2 '06 #2
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.

"AMDRIT" wrote:
Access supports workgroup security files. This allows you to create users,
groups and assign security to the database objects even at the field level.
Once the workgroup file is setup, you can then provide a simple interface in
your application to prompt the user for the login information. The security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol.com> wrote in message
news:11*********************@g10g2000cwb.googlegro ups.com...
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi


May 2 '06 #3

AverageUser wrote:
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.


What can I do about this? If I throw away VB and use Access directly
would that be better, or should I use something such as Oracle?

Thank you,
Christopher Lusardi

May 3 '06 #4
Every lock has a lockpick. Access' security file is good enough. LAN
deployments are reasonably safe, just like pending deposits your accountants
manage. It would be more secure than a CSV file. If you are that concerned
about the security, create a webservice or remoting service and put the
server in a NOC, or move to a major RDBMS.

I don't think that security should be the main focus with Access. Rather,
file locks on Novell servers, or data contention and disaster recovery
should be the main focus.

More about that security file. If you attempt to open the MDB without the
security file, you will recieve an error. The only way I suppose you could
bypass the security file, is to modify the header of the database itself.
Absense of the security file is the same as absense of your key on the way
back from vacation; there may be another way in, most people wont try it.

"AverageUser" <Av*********@discussions.microsoft.com> wrote in message
news:29**********************************@microsof t.com...
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.

"AMDRIT" wrote:
Access supports workgroup security files. This allows you to create
users,
groups and assign security to the database objects even at the field
level.
Once the workgroup file is setup, you can then provide a simple interface
in
your application to prompt the user for the login information. The
security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol.com> wrote in message
news:11*********************@g10g2000cwb.googlegro ups.com...
> Hello again,
>
> I have to go home and read up on Access.
>
> But, I have read else-where in this newsgroup that I can just save the
> password in the database under scrutiny.
>
> Wouldn't it be wasteful to create a password column for all database
> entries?
>
> E.G.:
>
> Entry 1: password field1 ... fieldn
> ...
> Entry M:password field1 ... fieldn
>
> Note: For security reasons (unless I have to), I do not want to
> hardcode passwords in VB 8, or save encryted passwords in a text file..
>
> Thanks,
> Christopher Lusardi
>


May 3 '06 #5
I think I'll store hashed passwords in a database and keep a backup of
the database.

Chris

May 3 '06 #6
What is it that you want to protect, really, and from whom?

cl********@aol.com wrote:
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 3 '06 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Klaus Kragelund | last post by:
Hi I'm using DreamWeaver 2004 on a Win2k machine to create my homepage. After spending several hours of mingling with ASP I discover that my ISP doesn't support Access databases. So I turned to...
0
by: Brenny | last post by:
Hi I'm developing a project and in the project, I used crystal report. Firstly my database isn't protected with password. After finishing project I determined a password for my database. Firstly...
2
by: Brian Henry | last post by:
We have our windows forms login set up and working good, well it works at least, just now we need a logout button, so when you click on it, the user will be logged out of the authentication, how...
5
by: Alex Nitulescu | last post by:
Hi. Because I'm a beginner in creating controls, I spent more than two *&^#$ hours to create this "login" as a custom control and to make it work properly: ...
7
by: Samuel Shulman | last post by:
Is there a method that will indicate the person who logged successfully is Logged and therefore allowed to browse freely other then using the...
2
by: ad | last post by:
I use login control of VS2005 in my web application. The web applicaiton is developed in my notebook. It run ok in my notebook, but when I login in from another PC with the user ID and password,...
9
by: Ben | last post by:
Hello, I'll bet this has been asked a million times but I can't seem to find a thread that gives the clear example I need. This PC has MySQL and IIS configured and running. The MySQL database is...
4
by: Vlad | last post by:
I am having problems using the file.create method within a function that is called when looping through an array of filepaths. If I call my function with a hardcoded file path --C:\Temp.txt the...
8
by: ssmeshack | last post by:
Hai All, Im doing a login page.... And that was without cookie.... I realy dono how to create cookie... pls anyone can help... Here is code from Default.aspx for login control: <asp:Login...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.