473,890 Members | 1,374 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing a Database

Greetings. I am looking for some advice on making a database secure.
By secure, I mean that I want only certain people to have write access
to the database and I want the updates to be permitted while other
read-only users may be browsing and generating reports.

I am working with MS/ACCESS 2000 and would like to split the database
into a front-end and back-end and then put the back-end onto a shared
drive that all of my group has access to. My goal is that all of my
team members (colleagues) will have a shortcut icon on their desktop and
some of them will have more 'permissions' than others. Some will have
read-only access and others will have read/update/delete access.

I have been reading some information trying to self-educate but really
would like some guidance before I really screw this up.

1. Should I split the database first?
2. Shoud I set the ADMIN password next?
3. Should I use the Security Wizard? If so, any pointers? I have
created some test databases trying to do test runs and have failed
miserably.

Thanks, in advance, for all your help.
Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #1
11 1911
Study this white paper/FAQ...
http://support.microsoft.com/default...ent/secfaq.asp

- Jim

On 24 May 2004 19:06:32 GMT, Susan Bricker <sb****@att.net > wrote:
Greetings. I am looking for some advice on making a database secure.
By secure, I mean that I want only certain people to have write access
to the database and I want the updates to be permitted while other
read-only users may be browsing and generating reports.

I am working with MS/ACCESS 2000 and would like to split the database
into a front-end and back-end and then put the back-end onto a shared
drive that all of my group has access to. My goal is that all of my
team members (colleagues) will have a shortcut icon on their desktop and
some of them will have more 'permissions' than others. Some will have
read-only access and others will have read/update/delete access.

I have been reading some information trying to self-educate but really
would like some guidance before I really screw this up.

1. Should I split the database first?
2. Shoud I set the ADMIN password next?
3. Should I use the Security Wizard? If so, any pointers? I have
created some test databases trying to do test runs and have failed
miserably.

Thanks, in advance, for all your help.
Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!


Nov 13 '05 #2

Thank you for the information. I have been studying ... and taking test
runs with test versions of my database. I still have some questions,
though.

My application has forms that have separate command buttons to browse
(view), edit, add, save a record. I would like to disable the
appropriate buttons when a user with read-only access logon into the
application. I have been searching the online help and the FAQ list and
have not been successful in figuring out, programmaticall y, how to
determine ...

1. Who is logged on? (user name)
2. What group is the user in? (group name) which will imply the
permissions assigned to the user.

How should I go about this task? I was thinking something like putting
a call to a new function in the initial Switchboard open event function.
The new function would find out who the user is and the group name and
then set a global variable (I, already, have a global Collection of
variables defined and could another variable to the collection). Then
whenever a new form opens I could inspect the global variable and
disable/enable the various buttons at will.

What do you think?

Thanks.
Sue


*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #3

Thank you for the information. I have been studying ... and taking test
runs with test versions of my database. I still have some questions,
though.

My application has forms that have separate command buttons to browse
(view), edit, add, save a record. I would like to disable the
appropriate buttons when a user with read-only access logon into the
application. I have been searching the online help and the FAQ list and
have not been successful in figuring out, programmaticall y, how to
determine ...

1. Who is logged on? (user name)
2. What group is the user in? (group name) which will imply the
permissions assigned to the user.

How should I go about this task? I was thinking something like putting
a call to a new function in the initial Switchboard open event function.
The new function would find out who the user is and the group name and
then set a global variable (I, already, have a global Collection of
variables defined and could another variable to the collection). Then
whenever a new form opens I could inspect the global variable and
disable/enable the various buttons at will.

What do you think?

Thanks.
Sue


*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #4
Just finished securing my own database after many failed attempts.
Follow the steps as described here. Worked like a charm.
http://support.microsoft.com/default...NoWebContent=1

"Jim Allensworth" <ji****@Notdata centricsolution s.com> wrote in message news:<40******* **********@news .west.earthlink .net>...
Study this white paper/FAQ...
http://support.microsoft.com/default...ent/secfaq.asp

- Jim

On 24 May 2004 19:06:32 GMT, Susan Bricker <sb****@att.net > wrote:
Greetings. I am looking for some advice on making a database secure.
By secure, I mean that I want only certain people to have write access
to the database and I want the updates to be permitted while other
read-only users may be browsing and generating reports.

I am working with MS/ACCESS 2000 and would like to split the database
into a front-end and back-end and then put the back-end onto a shared
drive that all of my group has access to. My goal is that all of my
team members (colleagues) will have a shortcut icon on their desktop and
some of them will have more 'permissions' than others. Some will have
read-only access and others will have read/update/delete access.

I have been reading some information trying to self-educate but really
would like some guidance before I really screw this up.

1. Should I split the database first?
2. Shoud I set the ADMIN password next?
3. Should I use the Security Wizard? If so, any pointers? I have
created some test databases trying to do test runs and have failed
miserably.

Thanks, in advance, for all your help.
Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!

Nov 13 '05 #5
Just finished securing my own database after many failed attempts.
Follow the steps as described here. Worked like a charm.
http://support.microsoft.com/default...NoWebContent=1

"Jim Allensworth" <ji****@Notdata centricsolution s.com> wrote in message news:<40******* **********@news .west.earthlink .net>...
Study this white paper/FAQ...
http://support.microsoft.com/default...ent/secfaq.asp

- Jim

On 24 May 2004 19:06:32 GMT, Susan Bricker <sb****@att.net > wrote:
Greetings. I am looking for some advice on making a database secure.
By secure, I mean that I want only certain people to have write access
to the database and I want the updates to be permitted while other
read-only users may be browsing and generating reports.

I am working with MS/ACCESS 2000 and would like to split the database
into a front-end and back-end and then put the back-end onto a shared
drive that all of my group has access to. My goal is that all of my
team members (colleagues) will have a shortcut icon on their desktop and
some of them will have more 'permissions' than others. Some will have
read-only access and others will have read/update/delete access.

I have been reading some information trying to self-educate but really
would like some guidance before I really screw this up.

1. Should I split the database first?
2. Shoud I set the ADMIN password next?
3. Should I use the Security Wizard? If so, any pointers? I have
created some test databases trying to do test runs and have failed
miserably.

Thanks, in advance, for all your help.
Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!

Nov 13 '05 #6

Very good step by step instructions. I ran into one problem, though.
Step 13 .. "import all the objects from your original database into the
new database". I thought that I did that, but the VBA code behind the
forms and reports did not get imported. Good thing I have a few copies
of this Application. Any ideas what I did wrong?

Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #7
Susan Bricker wrote:
Thank you for the information. I have been studying ... and taking
test runs with test versions of my database. I still have some
questions, though.

My application has forms that have separate command buttons to browse
(view), edit, add, save a record. I would like to disable the
appropriate buttons when a user with read-only access logon into the
application. I have been searching the online help and the FAQ list
and have not been successful in figuring out, programmaticall y, how to
determine ...

1. Who is logged on? (user name)
CurrentUser()
2. What group is the user in? (group name) which will imply the
permissions assigned to the user.
You have to loop through the group collection (a person may belong to
more than one group)

Dim ws As Workspace, usr As User, i As Integer
Set ws = DBEngine.Worksp aces(0)
Set usr = ws.Users(Curren tUser) 'current username
For i = 0 To usr.Groups.Coun t - 1 'loop through user's groups
myGroup = usr.Groups(i).N ame
If myGroup = "Admins"
' Code to run if in Admin group
End If
Next i
How should I go about this task? I was thinking something like
putting a call to a new function in the initial Switchboard open
event function. The new function would find out who the user is and
the group name and then set a global variable (I, already, have a
global Collection of variables defined and could another variable to
the collection). Then whenever a new form opens I could inspect the
global variable and disable/enable the various buttons at will.

What do you think?

Thanks.
Sue

--
regards,

Bradley
Nov 13 '05 #8
Bradley,
Thank you for your help. If I can get past the 'securing and setting of
permissions' then I will definitely use your suggested source code.

But I have MAJOR PROBLEMS with this entire process.
I am following the steps outlined in one of the links mentioned on a
previous reply. Of course, I think that I am doing everything
correctly. But ...

Here's what I have ...

Original application: relutil.mdb
Copy of application: TESTrelutil.mdb

After I have created the new user (for me) in the Admins group and I
have moved the Admin user to the Users group, I open a new db and name
it TTrelutil.mdb. Then I create another group called RelCoords and
assign all the necessary permissions. I then add 1 user to RelCoords
group and 1 user to Users group. Then I import the TESTrelutil objects
(all of them) to TTrelutil.mdb. Then I exit MS/ACCESS. Here are the
problems:

1. No users can log onto the TTrelutil application. The error occurs
after hitting the OK key on the logon window. It says that there may
have been a loss of Network connection. Mind you I am only working in
my personal PC (no network involved yet ... I am only testing).

2. The id that is in the Admins group is unable to bypass the startup
logic, by holding the shift key down. I do not know how to disable the
'shift-key', yet, for start-up. So I did not do anything intentionally
to do so. The result, I can't get into the development windows for
Access.

The only way I figured out to rectify this was to run the WRKGADM.EXE
and 'join' the original SYSTEM.MDW (Original Workgroup settings) and go
back to the beginning.
HELP!!!!

Thanks.
Sue

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #9
"Susan Bricker" <sb****@att.net > wrote in message
news:40******** *************@n ews.frii.net...

But I have MAJOR PROBLEMS with this entire process.
I am following the steps outlined in one of the links mentioned on a
previous reply. Of course, I think that I am doing everything
correctly. But ...
No you are not following the steps correctly. more....

Original application: relutil.mdb
Copy of application: TESTrelutil.mdb

After I have created the new user (for me) in the Admins group
That is not the first step. If this is what you did first, then it doesn't
matter what you did after this.
and I
have moved the Admin user to the Users group, I open a new db and name
it TTrelutil.mdb.
Again, you did this while logged in as Admin and so TTrelutil.mdb is owned
by Admin.
Then I create another group called RelCoords and
assign all the necessary permissions. I then add 1 user to RelCoords
group and 1 user to Users group. Then I import the TESTrelutil objects
(all of them) to TTrelutil.mdb.


How could you assign permissions to objects, before they were imported?
<rest snipped>

I would suggest you go back to relutil.mdb and start over.

Make a copy of it again TESTrelutil.mdb .

You are using Access 2000, so don't use the security wizard.

It is essential that you follow every step (every phrase in fact) in order.

You can try the detailed steps I have outlined for 2000 at
http://www.jmwild.com/security97.htm

--
Joan Wild
Microsoft Access MVP

Nov 13 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
1978
by: byrocat | last post by:
I'm chasing after a documetn that was available on one of the Microsoft websites that was titled somethign like "MS SQL Server Best Practices" and detailed a nyumber of best practices about securing the server. Included in this was revoking public access to the system table objects. Can someone post the URL where I can pick this up, or drop me a note on contacting them for a copy of the document?
2
1613
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it with every function call from my windows client. Any alternatives?
4
1408
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my question: How have developers successfully prevented access to their data tables and protected their database design? Looking forward to some suggestions. Tony
7
2222
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store MS Word docs in a folder on a network server. The database admin will save the docs to the folder. The docs must be available to Word automation out of a specific Access database and available to the database admin out of MS Word. Only users of...
9
1793
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1. IPGAdmin is now a member of the ‘Admins’ group and owns the database and imported objects. 2. Admin the old user does not own the objects or the database and does not have any permissions.
4
3929
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+ users. I've experimented with securing the database but can't get it the way I want it. I can still use the shift key to obtain access. Anyone have a link to a site or something to give me a guideline as to what I can do? Thanks
4
2821
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a separate front-end and back-end, which is rather surprising considering that all Access databases should be split into a separate front-end and back-end. Noticing that there are quite a lot of questions on this subject in the Access newsgroups...
4
1727
omerbutt
by: omerbutt | last post by:
hi every one I am A new Bee to php mysql and i was surfing through the net to learn about how to secure the mysql when you are working in a web environment while working with php html and javascript i came through this article http://articles.techrepublic.com.com/5100-6350_11-5287638.html and before i proceede i must tell you that iam using win xp professional sp2 where were given two main and very first step before you start making your...
10
3389
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1. Data encrypted by AES key 2. AES key encrypted with Asymmetric public key (?)
0
9978
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9819
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
11222
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9625
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
7169
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5845
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4674
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
4270
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
3275
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.