Hello all,
Is there a way to add users to a secured database without having to go
into Security -> User and Group Accounts? I have a table for all
employees on a secure database, and want to be able to just add new
employees once (ie into the emplyee table not the security section),
and having it added to the user accounts.
Thanks in advance,
Therese 3 3713
You can perform security functions programatticall y from an user account
with the required permissions. There's good coverage in the Access <version>
Developer's Handbook by Litwin, Getz, et al, published by Sybex. There's
coverage in online documentation and the Microsoft web site, but it is
scattered and you have to search it out.
However, I'd caution that by keeping security information in just another
database table, you are likely compromising the security of your database.
Access security, while not unbreakable, is more difficult to break than it
is for someone to get into an Access table.
Larry Linson
Microsoft Access MVP
"Therese A. Sorna" <ta*****@yahoo. com> wrote in message
news:be******** *************** ***@posting.goo gle.com... Hello all,
Is there a way to add users to a secured database without having to go into Security -> User and Group Accounts? I have a table for all employees on a secure database, and want to be able to just add new employees once (ie into the emplyee table not the security section), and having it added to the user accounts.
Thanks in advance, Therese
Any hints on what I should search for on the microsoft website. I
have searched extensively, but have found nothing that shows me how to
do this. Or, perhaps you can share the code?
Thanks,
T
"Larry Linson" <bo*****@localh ost.net> wrote in message news:<Jg******* ********@nwrddc 02.gnilink.net> ... You can perform security functions programatticall y from an user account with the required permissions. There's good coverage in the Access <version> Developer's Handbook by Litwin, Getz, et al, published by Sybex. There's coverage in online documentation and the Microsoft web site, but it is scattered and you have to search it out.
However, I'd caution that by keeping security information in just another database table, you are likely compromising the security of your database. Access security, while not unbreakable, is more difficult to break than it is for someone to get into an Access table.
Larry Linson Microsoft Access MVP
"Therese A. Sorna" <ta*****@yahoo. com> wrote in message news:be******** *************** ***@posting.goo gle.com... Hello all,
Is there a way to add users to a secured database without having to go into Security -> User and Group Accounts? I have a table for all employees on a secure database, and want to be able to just add new employees once (ie into the emplyee table not the security section), and having it added to the user accounts.
Thanks in advance, Therese
"Therese A. Sorna" wrote Any hints on what I should search for on the microsoft website. I have searched extensively, but have found nothing that shows me how to do this.
The only security item that I know about, for sure, is the Security FAQ
which can be downloaded from http://www.microsoft.com/downloads/. Two
places to _start_ searching would be the Knowledge Base at http://support.microsoft.com, using Advanced Search, and the Microsoft
Developer Network site, http://msdn.microsoft.com.
Or, perhaps you can share the code?
The only security code that I have written was minimal, was done a long time
ago, and was in a client's proprietary database. Of course, I can't share
the code from the Developer's Handbook, because it is copyrighted - sorry.
Larry Linson
Microsoft Access MVP This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Kelly Bowles |
last post by:
I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture and
linked by some sort of password .
I wanted to tell them just have everybody sign the documents when it comes
out of the printer.
I was shown that it was...
|
by: Galina |
last post by:
Hello
I recently updated my database applications from MS Access 97 to
Access 2000. I somehow missed that the security file also should have
been updated. All went fine and smooth. The applications have been
working for a couple of month now and they still work, but a size of
the security file is more then 270 Mb now!
There are several...
|
by: Keith G. Murphy |
last post by:
I'm trying to get a feel for what most people are doing or consider best
practice.
Given a mod_perl application talking to a PostgreSQL database on the
same host, where different users are logging onto the web server using
LDAP for authentication, do most people
1) have the web server connecting to the database using its own user
account...
|
by: google |
last post by:
I have a few general questions. I am working on a new database to be
used within my company. I would like to give a couple of people,
particularly HR, the ability to add and delete Access users, and
add/remove them to groups, so as people join and leave the company,
they can be added/removed as database users at that time. However, I
don't...
|
by: Jan |
last post by:
Hi:
I've used the /decompile switch lots of times when working with
troublesome databases. Now, though, I have a database that is secured,
and I can't get the /decompile switch to work with the /wrkgrp switch.
Here's the shortcut I usually use for starting the secured database:
"C:\Program Files\Microsoft...
| |
by: chris.thomson |
last post by:
Hi,
Thanks in advance for any assistance regarding my question.
I have setup a database with a WIF containing the usernames and p/words
of several unique data entry operators who will be entering data into
the database.
I would like to know how I record the username of each unique data
entry operator against any entries they input into...
|
by: rdemyan |
last post by:
I'm trying to use TransferDatabase to transfer tables from an external
secured DB to a database created in the code. I would like to kind of
use automation, although OpenCurrentDatabase apparantly can't be made
to work with secured databases. I saw a post where someone from MS
recommended GetObject.
My code below has two problems. I keep...
|
by: securedcardss |
last post by:
http://card.2youtop.info
secured credit card
card
credit instant secured
card cash
credit secured
card
|
by: gazelle04 |
last post by:
I've been searching for an effective way of security an Access database. From creating database password, encrypting, disabling shift key at start up, and the user-level security.
The user level security is the most secured way of protecting Access database. But if the mdw file will be distributed or will be known to users then security is gone...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language...
| |
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it. ...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |