473,779 Members | 2,053 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Strange problem with secured database--Urgent HELP Needed

Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access.
So let the access application be xxx.mdb. After completing the whole
development for xxx.mdb, i secured it using the procedure defined in
the FAQ and created the Workgroup information file for it, say
xxx_WIF.mdw. I tested it for my satisfaction and everything was
working exactly the way it is supposed to.
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database.
Then i again tested on my beta machine and 4 other machines and quite
surprisingly it works fine on 3 machines i.e. I am not able to acess
the application without using xxx_WIF.mdw but on other two machines,
the user is able to open it using the default windows WIF
(system.mdw). (All machines use MS Access 2002 with SP3 installed)
I tried many methods to observe the reason for this behavouri but was
unsuccesfull and now have to turn to the community for SOS. Any inputs
from the community will be highly appreciated and is needed urgently
as the application is scheduled to be deployed into a couple of days.
Thanks,
Nitin

Peace :)
Nov 13 '05 #1
4 1390
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access. [SNIP]
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database. [SNIP]


When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
"Rick Brandt" <ri*********@ho tmail.com> wrote in message news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. Default "Admin" also
has been stripped of all the rights with no permissions assigned to
"Users' group too. But then anything being wrong with that is a
secondary issue. The main issue that I am facing is that the
application is getting opened by a WIF that was not used to secure it.
Any further inputs to rectify the problem will be appreciated.
Thanks in advance.

Nitin

Peace
Nov 13 '05 #3
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
"Rick Brandt" <ri*********@ho tmail.com> wrote in message

news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
"Rick Brandt" <ri*********@ho tmail.com> wrote in message news:<2n******* *****@uni-berlin.de>...
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
"Rick Brandt" <ri*********@ho tmail.com> wrote in message

news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.

Yes Rick, the database as well. This is the most disturbing point.
Everything seems to be in place, though i am sure that there is
something wrong somewhere that is causing the behaviour. Any other
things that i should consider? Guess, will have to implement it again
from start on the backup file if the issue doesn't resolves soon.
Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
1728
by: Richard Kuhns | last post by:
I can't iterate over os.environ, while a 'hand-made' dictionary works. It works fine with python 2.2.3 under FreeBSD 4.8. I looked through the release notes but didn't find anything I thought applied, so I guess I'd just like to know if this is something peculiar to my system, or is it more wide-spread? Here's what I get: : molin$~; python Python 2.2.1 (#1, Aug 30 2002, 12:15:30) on linux2 Type "help", "copyright", "credits" or...
4
1356
by: Julien Sagnard | last post by:
Hi all, When passing a list as default argument for a function, only one list is created for all calls. exemple: >>> def f(a=): .... a.append("x") .... print a .... >>> f()
1
1269
by: Jim Hubbard | last post by:
I want to implement the same type of activeX restrictions in my browser application that the new SP2 for XP places in Internet Explorer. I have found 2 web pages dealing with this functionality (http://msdn.microsoft.com/library/default.asp?url=/workshop/security/szone/reference/enums/INTERNETFEATURELIST.asp and http://msdn.microsoft.com/library/default.asp?url=/workshop/browser/hosting/wbcustomization.asp) but I am at a loss as to how...
3
1673
by: Jason | last post by:
I have two applications that I wrote that use asp and javascript source files. Recently both of these applications starting acting strange on my test box. Image icons will randomly stop showing up and any javascript that I use a src file with <script language="javascript" src="mytest.js"></script> ) returns random errors. Javascript on the page itself works fine. If I click f5 multiple times I will get different results. I am...
2
1614
by: stabbert | last post by:
Can anyone confirm that the privelges needed to do an IMPORT with REPLACE have changed from 7.x to 8.x in DB2 UDB? I am finding the following definition in the online books for version 8 of DB2. I thought that the last line of only needing INSERT, SELECT and DELETE was not present in the security definition for this operation in v7, anyone confirm? The reason I am asking is we have some user id's that have control privelges on tables...
1
1281
by: jedi | last post by:
I have newly acquired Ms Access 2003 after working for a number of years with Access 97. In that edition I used VBA quite extensively for updating recordsets under DAO protocols. Now I find that DAO formats don't work if I construct them in this edition of Access. What I want to know please is how I can get the program to create the 'connection' required in ADO so that I can continue to use constructs and similar methods to those that...
0
1005
by: harrylmh | last post by:
Hi, I found something strange about the mouse's X,Y coordinates. Here's a program I made for testing. Start by moving your mouse over the Label on the left, then...move your mouse slowly from left to right until it goes out of the label. You'll see the inconsistency in the X property. When you move out of the label the X value seems to increment by a number pixels. The same is true for the Y coordinate if you go vertical. Anyone knows...
1
1467
by: pcard | last post by:
Hello, I ran the User-Level Security Wizard to try to secure an Access database that I created. But after I finished the steps, saved the report that contains all the important user/group info, and reopened my secured database, it DOESN'T prompt me with the log in box where you can log in either as admin or user. Can please you help me Was I missing something? Thanks in advance! -pcard
2
1446
by: korean44 | last post by:
A beginner in C# .. I wrote 2 classes like below.. (psuedo code) public class FormUI : System.Windows.Forms.Form { public TextBox tbResult = new TextBox(); ...
0
10302
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10136
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10071
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9925
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8958
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6723
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5372
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5501
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4036
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.