473,837 Members | 1,516 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Strange problem with secured database--Urgent HELP Needed

Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access.
So let the access application be xxx.mdb. After completing the whole
development for xxx.mdb, i secured it using the procedure defined in
the FAQ and created the Workgroup information file for it, say
xxx_WIF.mdw. I tested it for my satisfaction and everything was
working exactly the way it is supposed to.
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database.
Then i again tested on my beta machine and 4 other machines and quite
surprisingly it works fine on 3 machines i.e. I am not able to acess
the application without using xxx_WIF.mdw but on other two machines,
the user is able to open it using the default windows WIF
(system.mdw). (All machines use MS Access 2002 with SP3 installed)
I tried many methods to observe the reason for this behavouri but was
unsuccesfull and now have to turn to the community for SOS. Any inputs
from the community will be highly appreciated and is needed urgently
as the application is scheduled to be deployed into a couple of days.
Thanks,
Nitin

Peace :)
Nov 13 '05 #1
4 1394
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access. [SNIP]
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database. [SNIP]


When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
"Rick Brandt" <ri*********@ho tmail.com> wrote in message news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. Default "Admin" also
has been stripped of all the rights with no permissions assigned to
"Users' group too. But then anything being wrong with that is a
secondary issue. The main issue that I am facing is that the
application is getting opened by a WIF that was not used to secure it.
Any further inputs to rectify the problem will be appreciated.
Thanks in advance.

Nitin

Peace
Nov 13 '05 #3
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
"Rick Brandt" <ri*********@ho tmail.com> wrote in message

news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
"Rick Brandt" <ri*********@ho tmail.com> wrote in message news:<2n******* *****@uni-berlin.de>...
"xunitinmul lik" <ni**********@y ahoo.com> wrote in message
news:da******** *************** ***@posting.goo gle.com...
"Rick Brandt" <ri*********@ho tmail.com> wrote in message

news:<2n******* *****@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.

Yes Rick, the database as well. This is the most disturbing point.
Everything seems to be in place, though i am sure that there is
something wrong somewhere that is causing the behaviour. Any other
things that i should consider? Guess, will have to implement it again
from start on the backup file if the issue doesn't resolves soon.
Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
1732
by: Richard Kuhns | last post by:
I can't iterate over os.environ, while a 'hand-made' dictionary works. It works fine with python 2.2.3 under FreeBSD 4.8. I looked through the release notes but didn't find anything I thought applied, so I guess I'd just like to know if this is something peculiar to my system, or is it more wide-spread? Here's what I get: : molin$~; python Python 2.2.1 (#1, Aug 30 2002, 12:15:30) on linux2 Type "help", "copyright", "credits" or...
4
1360
by: Julien Sagnard | last post by:
Hi all, When passing a list as default argument for a function, only one list is created for all calls. exemple: >>> def f(a=): .... a.append("x") .... print a .... >>> f()
1
1273
by: Jim Hubbard | last post by:
I want to implement the same type of activeX restrictions in my browser application that the new SP2 for XP places in Internet Explorer. I have found 2 web pages dealing with this functionality (http://msdn.microsoft.com/library/default.asp?url=/workshop/security/szone/reference/enums/INTERNETFEATURELIST.asp and http://msdn.microsoft.com/library/default.asp?url=/workshop/browser/hosting/wbcustomization.asp) but I am at a loss as to how...
3
1680
by: Jason | last post by:
I have two applications that I wrote that use asp and javascript source files. Recently both of these applications starting acting strange on my test box. Image icons will randomly stop showing up and any javascript that I use a src file with <script language="javascript" src="mytest.js"></script> ) returns random errors. Javascript on the page itself works fine. If I click f5 multiple times I will get different results. I am...
2
1616
by: stabbert | last post by:
Can anyone confirm that the privelges needed to do an IMPORT with REPLACE have changed from 7.x to 8.x in DB2 UDB? I am finding the following definition in the online books for version 8 of DB2. I thought that the last line of only needing INSERT, SELECT and DELETE was not present in the security definition for this operation in v7, anyone confirm? The reason I am asking is we have some user id's that have control privelges on tables...
1
1282
by: jedi | last post by:
I have newly acquired Ms Access 2003 after working for a number of years with Access 97. In that edition I used VBA quite extensively for updating recordsets under DAO protocols. Now I find that DAO formats don't work if I construct them in this edition of Access. What I want to know please is how I can get the program to create the 'connection' required in ADO so that I can continue to use constructs and similar methods to those that...
0
1005
by: harrylmh | last post by:
Hi, I found something strange about the mouse's X,Y coordinates. Here's a program I made for testing. Start by moving your mouse over the Label on the left, then...move your mouse slowly from left to right until it goes out of the label. You'll see the inconsistency in the X property. When you move out of the label the X value seems to increment by a number pixels. The same is true for the Y coordinate if you go vertical. Anyone knows...
1
1469
by: pcard | last post by:
Hello, I ran the User-Level Security Wizard to try to secure an Access database that I created. But after I finished the steps, saved the report that contains all the important user/group info, and reopened my secured database, it DOESN'T prompt me with the log in box where you can log in either as admin or user. Can please you help me Was I missing something? Thanks in advance! -pcard
2
1448
by: korean44 | last post by:
A beginner in C# .. I wrote 2 classes like below.. (psuedo code) public class FormUI : System.Windows.Forms.Form { public TextBox tbResult = new TextBox(); ...
0
9843
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9406
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7807
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
7004
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5670
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5850
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4475
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
4043
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
3126
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.