473,566 Members | 3,273 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Adding a password protected field for a scanned signature

I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture and
linked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comes
out of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly
Nov 12 '05 #1
4 2852
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles" <ke*********@ho tmail.com>
wrote:
I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture and
linked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comes
out of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly


First of all, you need to find out how strong the security requirements are
for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that the
average employee would figure out how to access the signatures, then Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by you,
and not by the Admin user, and all permissions for the Admin user have been
removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they were
done properly.

Next, you want to have the table containing the signature images and passwords
secured so that only you have access to it, then create a query also owned by
you and with read-only permissions for others, and set the Owner Permissions
property which allows the query to run with your permissions even when run by
someone else. For the query criteria, you want to restrict the output to rows
where the password matches a control on a form into which the user will have
entered the password (e.g. Forms!frmSecuri ty!txtPassword) . The form should
use the Password input mask, so other users can't read the password on the
screen.
Nov 12 '05 #2
I have ordered Real World Microsoft Access Database Protection and Security
by Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam. nospam> wrote in message
news:4v******** *************** *********@4ax.c om...
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles" <ke*********@ho tmail.com> wrote:
I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture andlinked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comesout of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly

First of all, you need to find out how strong the security requirements

are for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that the average employee would figure out how to access the signatures, then Access is probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by you, and not by the Admin user, and all permissions for the Admin user have been removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they were done properly.

Next, you want to have the table containing the signature images and passwords secured so that only you have access to it, then create a query also owned by you and with read-only permissions for others, and set the Owner Permissions property which allows the query to run with your permissions even when run by someone else. For the query criteria, you want to restrict the output to rows where the password matches a control on a form into which the user will have entered the password (e.g. Forms!frmSecuri ty!txtPassword) . The form should use the Password input mask, so other users can't read the password on the
screen.


Nov 12 '05 #3
Ah, I didn't mean you necessarily needed a single book just on Access
Security, just that you needed a reputable book on Access with a decent
chapter on the subject if you don't already have one.

On Mon, 26 Jan 2004 11:26:07 -0600, "Kelly Bowles" <ke******@hotma il.com>
wrote:
I have ordered Real World Microsoft Access Database Protection and Security
by Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam. nospam> wrote in message
news:4v******* *************** **********@4ax. com...
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles"

<ke*********@h otmail.com>
wrote:
>I have made a purchase requistion which I have been asked to put password
>protected copy of requestors signature.
>I am thinking that each signature will have to be scanned as a pictureand >linked by some sort of password .
>
>I wanted to tell them just have everybody sign the documents when itcomes >out of the printer.
>I was shown that it was done on another form. It was not Access and I was
>not allowed to take the form apart.
>
>Thanks,
>Kelly
>


First of all, you need to find out how strong the security requirements

are
for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that

the
average employee would figure out how to access the signatures, then

Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by

you,
and not by the Admin user, and all permissions for the Admin user have

been
removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they

were
done properly.

Next, you want to have the table containing the signature images and

passwords
secured so that only you have access to it, then create a query also owned

by
you and with read-only permissions for others, and set the Owner

Permissions
property which allows the query to run with your permissions even when run

by
someone else. For the query criteria, you want to restrict the output to

rows
where the password matches a control on a form into which the user will

have
entered the password (e.g. Forms!frmSecuri ty!txtPassword) . The form

should
use the Password input mask, so other users can't read the password on the
screen.



Nov 12 '05 #4
A "more than decent" chapter on Access security, in fact, the only
"authority" on the subject that I recommend is the Microsoft Access Security
FAQ which is described at
http://support.microsoft.com/default...NoWebContent=1,
which also includes the address from which it can be downloaded.

Larry Linson
Microsoft Access MVP

"Steve Jorgensen" <no****@nospam. nospam> wrote in message
news:78******** *************** *********@4ax.c om...
Ah, I didn't mean you necessarily needed a single book just on Access
Security, just that you needed a reputable book on Access with a decent
chapter on the subject if you don't already have one.

On Mon, 26 Jan 2004 11:26:07 -0600, "Kelly Bowles" <ke******@hotma il.com>
wrote:
I have ordered Real World Microsoft Access Database Protection and Securityby Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam. nospam> wrote in message
news:4v******* *************** **********@4ax. com...
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles"

<ke*********@h otmail.com>
wrote:

>I have made a purchase requistion which I have been asked to put password >protected copy of requestors signature.
>I am thinking that each signature will have to be scanned as a picture

and
>linked by some sort of password .
>
>I wanted to tell them just have everybody sign the documents when it

comes
>out of the printer.
>I was shown that it was done on another form. It was not Access and I was >not allowed to take the form apart.
>
>Thanks,
>Kelly
>

First of all, you need to find out how strong the security requirements

are
for protecting the signature. If they're sufficiently high, then Access cannot do the job. If it is sufficient to simply make it unlikely that

the
average employee would figure out how to access the signatures, then

Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a properly secured database meaning that the database itself is owned by

you,
and not by the Admin user, and all permissions for the Admin user have

been
removed, etc. If you don't know all about this, get an Access book that covers it, and make sure you've done all the steps, and tested that they
were
done properly.

Next, you want to have the table containing the signature images and

passwords
secured so that only you have access to it, then create a query also
ownedby
you and with read-only permissions for others, and set the Owner

Permissions
property which allows the query to run with your permissions even when
runby
someone else. For the query criteria, you want to restrict the output
torows
where the password matches a control on a form into which the user will

have
entered the password (e.g. Forms!frmSecuri ty!txtPassword) . The form

should
use the Password input mask, so other users can't read the password on

the screen.


Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
3964
by: Chris | last post by:
I have a frontend that has some tables which are linked to a backend. Now I want to make the backend password protected and when I try to run it password protected I can't open it. In the first form that opens in the front end, I added the following to the form_open event: Dim cnn As ADODB.connection Set cnn = New ADODB.connection...
4
5998
by: MS | last post by:
Access 97 I have an Access FE that reconnects "automatically" regardless of whether the FE or BE have been moved to another folder. To achieve this, I have used Peter Vukovic's ( 100700.1262@compuserve.com ) excellent solution. As long as they are both in the same folder, they will reconnect. Function Reconnect() ' Bits snipped here...
4
2669
by: Geir Baardsen | last post by:
Hi! 1. I wonder if there is a possibility to open a BackEnd.Db from the opening form, the form e.g.: frmOrders, in the FrontEnd.Db, when the BackEnd.Db is password protected? 2. Do I need to do this with all forms, or can I somehow have a refreshing links function that at the same time pass the password to the linked tables in the...
2
3621
by: Clayton Hamilton | last post by:
I have a DataGrid on a webform bound to a Datasource and can successfully use <ItemTemplate> to create edit/update/cancel functionality for user maintenance of data. I use separate logic to delete a row. Everything works just fine. BUT I would like to add a button to (for example) the DataGrid header, which when pressed will add a new...
0
1227
by: Fabrice DG | last post by:
Hi all. I don't know if this post is really at the right place but I hope someone can help me.. I developed a NT service, in order to automate mail exchanges between different kind of users This service uses the POP3 and SMTP protocoles to perform the task Because we have a very heavy security policy, with no accessible SMTP gateways, I coded...
3
4863
by: Jim Heavey | last post by:
Trying to figure out the technique which should be used to add rows to a datagrid. I am thinking that I would want an "Add" button on the footer, but I am not quite sure how to do that. Is that the best method? Do you have a sample of how to do this?
0
1957
by: ganesh22 | last post by:
Hi... Iam using GridView in asp.net(2.0) .My requirement is user can add,update,delete in gridview I written the code for add & update but can u help adding rows in grid view My code: <asp:GridView ID="GridView1" runat="server" AutoGenerateColumns="False" CellPadding="3" Height="237px" Style="z-index: 100; left: 155px; ...
1
1354
by: Anoosha | last post by:
Need an urgent help! I use HP 8300 Scanjet to scan a page. The page consists of a barcode at the top of the page, some text information at the middle of the page and a SIGNATURE inside a square at the left-bottom of the page. Now I want in VB6.0, define only that part of the scanned-page, where I have the SIGNATURE (i.e. the square at the...
2
7650
by: Ken Fine | last post by:
I want to add the security question and answer security feature to the ChangePassword control. I am aware that this functionality is built into the PasswordRecovery tool. I have implemented the PasswordRecovery with a Password reset required; a temporary password is sent to the account on file. I want an extra layer of security to accommodate...
0
7673
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
7584
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
8109
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
1
7645
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
7953
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6263
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5485
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
1
2085
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
0
926
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.