473,657 Members | 2,625 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to Migrate Access Users/Groups/Permissions to SQL Server

JM
I need to take all the user/groups and permissions and migrate them to
SQL Server, how can this be done easily?
Nov 12 '05 #1
5 2127
"JM" <j_*******@hotm ail.com> wrote in message
news:c8******** *************** ***@posting.goo gle.com...
I need to take all the user/groups and permissions and migrate them to
SQL Server, how can this be done easily?


It can't. You would need to re-apply all of your security once the tables
are on the server.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 12 '05 #2
JM
There has to be an API or something that can do this?

"Rick Brandt" <ri*********@ho tmail.com> wrote in message news:<bv******* *****@ID-98015.news.uni-berlin.de>...
"JM" <j_*******@hotm ail.com> wrote in message
news:c8******** *************** ***@posting.goo gle.com...
I need to take all the user/groups and permissions and migrate them to
SQL Server, how can this be done easily?


It can't. You would need to re-apply all of your security once the tables
are on the server.

Nov 12 '05 #3
Fist of all, SQL Server doesn't care about the sanctity of the Access
objects...it only cares about data.

If you set your Access permissions up properly, then you're application should
"just work."

Rule #1) Access Security is an oxymoron.

You've made a nice step by upsizing to SQL Server.

If your object permissions are set properly, you should be able to use a
universal logon for your application. Where users log into the Access App,
they'll all be connected to SQL Server the "same way" ... that is, rights to
all tables.

HOWEVER! Again, if the application is "secure," certain users will only be able
to use certain forms, reports, queries, etc...so the data exposure should
already be controlled.
Nov 12 '05 #4
JM
The access database is merely the backend for a VB app, so using it to
maintain the permisisons isnt acceptible. I was hoping to migrate the
users and permissions to logins in sql server while maintaining the
object permissions. Inturn eliminating the need for access completely

dc****@aol.comSPNOAM (DCM Fan) wrote in message news:<20******* *************** *****@mb-m03.aol.com>...
Fist of all, SQL Server doesn't care about the sanctity of the Access
objects...it only cares about data.

If you set your Access permissions up properly, then you're application should
"just work."

Rule #1) Access Security is an oxymoron.

You've made a nice step by upsizing to SQL Server.

If your object permissions are set properly, you should be able to use a
universal logon for your application. Where users log into the Access App,
they'll all be connected to SQL Server the "same way" ... that is, rights to
all tables.

HOWEVER! Again, if the application is "secure," certain users will only be able
to use certain forms, reports, queries, etc...so the data exposure should
already be controlled.

Nov 12 '05 #5
I gotcha now...I didn't know about the VB part. But that should actually make
things simpler, since the VB part is a compiled EXE...with no objects visible
to the user.

That means that you only used TABLE-level permissions for certain users, right?

So, again, I'm confused as to what you need, because if your VB project is
built properly, it won't let users go into certain areas, based on login
alone....that has nothing to do with TABLE permissions, and everything to do
with how the VB app was built.

HOWEVER, if the VB is built improperly...an d you were hoping that the
TABLE-level permissions would tell you everything about a user, then you're in
deep doo-doo.

I can imagine building a VBA module that would read every user and their
table-rights, and build T-SQL statements that would create the appropriate
logins/permissions on SQL Server, but before I even spend one second on that, I
still need to understand how your VB works.

Why do you ABSOLUTELY NEED the table permissions to work as they did before? (I
claim you don't, since the tables are on SQL Server, and the VB app should be
hiding sensetive areas in the APPLICATION)
Nov 12 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
3278
by: Jay Moore | last post by:
Greetings, all! I have a project for work, and I'm not sure how to efficiently do what I need to do. I'm hoping someone out there can help. Project is this: I'm creating a web-based interface where people at my company (operators) can enter data for service calls. All data entered is run thru one or more PHP scripts for error checking and then stored in a MySQL database on a server here in the office.
2
1846
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a couple of questions. Scenario: I have MyApp.MDB up on a file server. I also have two Client PC's: Client1 and Client2 who use MyApp. (Both Client's are running Access 2002) On Client1's PC:
0
2083
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run or it attempts to perform an action which doe not have the required permissions then its execution...
29
15525
by: Patrick | last post by:
I have the following code, which regardless which works fine and logs to the EventViewer regardless of whether <processModel/> section of machine.config is set to username="SYSTEM" or "machine" ---Start of test.aspx---- <%@ Page language="C#" AutoEventWireup="false" %> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD>
1
2207
by: Amol Shambharker | last post by:
Hello Everyone, I have been working on setting up a windows 2003 machine with IIS 6.0.The web server has the web directory on a UNC share on a windows 2003 server.I want to migrate websites from a windows 2000 machine to this one using the migration tool.The problem with doing this is the migration tool does not migrate the FPSE user permissions across.Part of the problem I am sure is that the windows 2000 machine has the FPSE user permissions...
16
1980
by: JonnyD | last post by:
I am working on a project to build a reporting web app from an exsiting database that is controled by a local application. The application that has control over the database creates a lock file to the database and at that point I can no longer access the database with my web app. Is there anyway around this? All I need is read only access to the database to get some report information to display on the web page. The error I get on the...
4
3519
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The objective in utilizing this new deployment method is to reduce the maintenance overhead as well as making it easier for my users to setup and run the application initially. I have VS 2002, Windows XP, Access XP(2000 format). He is my problem....
10
3079
by: hugh welford | last post by:
Hi Have just installed IIS7 on Vista and am trying to access a .mdb file through ASP. Getting server error. I think the problem is in the file permission. Under XP Pro/IIS6 is used to have to set the .mdb file security via windows explorer to give IUSR_machinename full permissions on this file for anonymous web access. Cant seem to do this with Vista explorer - says object cannot be found.
0
1647
by: Bill E. | last post by:
I will be creating an application using MS Access as a client to SQL Server 2005. Each user will have the client installed on his/her machine. Some users will be attached to the local network where the SQL Server resides. Others will access the network via VPN. I was thinking of using an MDW workgroup file located on a network server to control access to various user interface elements (i.e., forms, reports) using defined groups. In...
0
8823
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8503
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8605
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7321
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6163
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4151
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4301
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2726
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1607
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.