473,789 Members | 2,773 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Security question - is this possible

I hope I can explain this clearly.

I have this database that calculates Bids for construction jobs. You log
in, (login id and password) select a project, go into that project and
create a "bid" where they can add items that will be needed for construction
(2x4, 4x4, nails, etc). They have the ability to create multiple versions
of the bid on each project.

At this point everyone has access to every project, as this is necessary.
General users have read/write access to add/edit/remove bids and items from
bids, they do not have the ability to change the project list or the list of
items to choose from. Admins have the ability to do everything (including
add/remove projects and Items from the master list). Finally, there is
"read only" for those who only need to print the bids.

But what they've asked is, can I set up security somehow so that if User Joe
creates Bid on XYZ project and creates versions and adds items that ONLY
User Joe can go in and delete items or Versions that he created. Likewise
UserJane can only view Joe's versions but cannot delete them. BUT, User
Joe's Secretary may be tasked with doing the data entry for the items, so
she will log in as herself but access the project and add

Currently there are 20,000 available projects and there isn't anything
stating which user controls which project. All users may potentially work
on a project.

There are also over 2000 items to choose from when creating a bid.

Secretaries could have access to add/remove items from a bid, but not have
access to add/remove bids.
Contractors could have access to add/remove items from their bid, but not
someone elses. Likewise for version of a bid or bids themself.

Is this something that is possible to do and where might I begin to look to
learn how to do something like this?


Nov 12 '05 #1
1 1937
It's possible, but sounds like it might be a bit of an undertaking. I assume
you are using the Access User Level security model. If so, you could add a
field to the necessary tables and store the user name of the CurrentUser.
Then you would need to put code behind your data entry forms to give the
various groups you set up different kinds of access. The code you need is in
the Security FAQ. There is a link to it on the Security page of my website.

--
Lynn Trapp
MS Access MVP
www.ltcomputerdesigns.com
Access Security: www.ltcomputerdesigns.com/Security.htm

"JayJay" <jj****@notmail .com> wrote in message
news:bj******** ****@ID-87431.news.uni-berlin.de...
I hope I can explain this clearly.

I have this database that calculates Bids for construction jobs. You log
in, (login id and password) select a project, go into that project and
create a "bid" where they can add items that will be needed for construction (2x4, 4x4, nails, etc). They have the ability to create multiple versions of the bid on each project.

At this point everyone has access to every project, as this is necessary.
General users have read/write access to add/edit/remove bids and items from bids, they do not have the ability to change the project list or the list of items to choose from. Admins have the ability to do everything (including add/remove projects and Items from the master list). Finally, there is
"read only" for those who only need to print the bids.

But what they've asked is, can I set up security somehow so that if User Joe creates Bid on XYZ project and creates versions and adds items that ONLY
User Joe can go in and delete items or Versions that he created. Likewise UserJane can only view Joe's versions but cannot delete them. BUT, User
Joe's Secretary may be tasked with doing the data entry for the items, so
she will log in as herself but access the project and add

Currently there are 20,000 available projects and there isn't anything
stating which user controls which project. All users may potentially work
on a project.

There are also over 2000 items to choose from when creating a bid.

Secretaries could have access to add/remove items from a bid, but not have
access to add/remove bids.
Contractors could have access to add/remove items from their bid, but not
someone elses. Likewise for version of a bid or bids themself.

Is this something that is possible to do and where might I begin to look to learn how to do something like this?

Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
2510
by: Olaf Baeyens | last post by:
Can someone out there point me to a URL or other reference how to use these security stuff in .NET? I know everything can be found online on the msdn but since I am new to this security stuff, I have a very hard time to find the correct page in the zillions of abstract pages talking about this topic. One of the problems is this: I can find information about FileIOPermission here:
3
2355
by: craig | last post by:
I am working on my first .NET development project that involves custom role-based security per the project requirements. This lead to a general design issue this week that really caused us some concern. I have described the situation below because we are very curious to see what other, more experienced, developers might suggest. The specific classes and fields are used just to illustrate the concepts. Our application uses role-based...
29
3043
by: rjames.clarke | last post by:
I am developing an online application and the last thing I need to get a handle on is security. This app is very heavy with forms. Business critical data will be entered via forms and inserted in to a database (mysql). I've google "php security" and from what I've read, I should: 1) Filter all form data by stripping all non-alpha/numeric characters out,
116
7557
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data and some who couldn't but that it wasn't important right now. And I said, 'sure, we can do that later'. So now I've developed an app without any thought to security and am trying to apply it afterwards. Doh!, doh! and triple doh!
1
1108
by: Mark | last post by:
All, I know this topic has been covered many times, but this particlar question is of a subject which I am just learning (VB). Once I have established what is possible, the individual will be approached and possibly disciplined but I wanted to get the lowdown first. Background: FE/BE on LAN. XP platform with office XP. I am using Access security (for group permissions e.g. no read on any of the
1
1262
by: cs5b | last post by:
I am looking for the official javascript security specification for web browsers. EMCAScript and DOM spec does not seem to contain a section on security, so I assume none exists and the security policies are implemented as the vendor pleases. If so, do security specs for IE and Mozilla exist? Any pointers would be greatly appreciated. Christian
1
1498
by: nancy | last post by:
I am new to PHP but have done other programming can someone please hold my hand and slowly talk me through some simple security issues? I have seen in PHP documents that there are 'strip slashes' commands and so on but I dont understand where the security issues actually are. i am writing some scripts that will shell out and call different linux shell programs such as 'ls' or 'grep' or 'sed' and so on and possibly update a 'mysql'...
1
1192
by: smjawad | last post by:
Hi, I am developing a system on which multiple front-end kiosks machines will be connected to a central server. I am being asked for the authentication mechanism for the machines, like how will the central server authenticate the machines on the network. IP authentication or password authentication is too simple for them. I thinking more on the lines of some sort of digital certificates. But I have seen them run on servers, never on...
18
2032
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all of the relevant facts. Second, despite the fact that I think the obvious 'quick' answer to my question would be 'Yes', I am seeking your wisdom and recommendation to the question as to this particular set of circumstances. I have 20 Security...
0
10412
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10200
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9986
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9021
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7529
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5422
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5551
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4093
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3703
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.