473,794 Members | 2,729 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Splitting/MDE's/Security

Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on the
local install directory, and use the command line parameters of the shortcut
to point the database file to this file, when starting up.

I want to keep my installations separate from other access databases on the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Can the back end inherit the security using the the splitter, even across
the Lan.
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'

Thanks in advance.

Gerry Abbott


--

Nov 13 '05 #1
3 1406
Still hoping that someone will answer my post.

I have looked at old threads and found a very userful one, which clarifies
where the MDW files should be placed in a multi-user environment, and it
touches on the need to assign permissions to the table links, of a linked
file. But my questions below remain unanswered.

http://groups.google.com/groups?hl=e...nbbsa03#link10


Gerry Abbott
"Gerry Abbott" <pl****@ask.i e> wrote in message
news:oI******** ***********@new s.indigo.ie...
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on
the local install directory, and use the command line parameters of the
shortcut to point the database file to this file, when starting up.

I want to keep my installations separate from other access databases on
the client's machines, that;s why i'm using the command line to link with
the mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Can the back end inherit the security using the the splitter, even across
the Lan.
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'

Thanks in advance.

Gerry Abbott


--

Nov 13 '05 #2
On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.i e>
wrote:
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on the
local install directory, and use the command line parameters of the shortcut
to point the database file to this file, when starting up.
A shared MDW is easier to maintain instead of a multitude of MDW's on
the local machines. (if that is what you meant...)

Using the shortcut to specify the MDW is the correct way to do it.

I want to keep my installations separate from other access databases on the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Do it manually.

Can the back end inherit the security using the the splitter, even across
the Lan.
LAN is irrelevant. Apparently the splitter fails to properly apply
security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'
Each Access session is controlled by an MDW. The backend will use the
accounts from whatever MDW was used to launch Access. Matters not
whether you open Access, then open the FE or open Access, then open
the BE. In both cases, the MDW that you used to launch Access controls
the permissions on the BE.

Check the paper on the website in my signature for additional
information.

Thanks in advance.

Gerry Abbott

*************** *******
ja************* *@telusTELUS.ne t
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security
Nov 13 '05 #3
Thanks Jack,

Nice paper, great help.

Regards,
Gerry Abbott

"Jack MacDonald" <ja************ **@telus.net> wrote in message
news:uv******** *************** *********@4ax.c om...
On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.i e>
wrote:
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on
the
local install directory, and use the command line parameters of the
shortcut
to point the database file to this file, when starting up.


A shared MDW is easier to maintain instead of a multitude of MDW's on
the local machines. (if that is what you meant...)

Using the shortcut to specify the MDW is the correct way to do it.

I want to keep my installations separate from other access databases on
the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.


Do it manually.

Can the back end inherit the security using the the splitter, even across
the Lan.


LAN is irrelevant. Apparently the splitter fails to properly apply
security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'


Each Access session is controlled by an MDW. The backend will use the
accounts from whatever MDW was used to launch Access. Matters not
whether you open Access, then open the FE or open Access, then open
the BE. In both cases, the MDW that you used to launch Access controls
the permissions on the BE.

Check the paper on the website in my signature for additional
information.

Thanks in advance.

Gerry Abbott

*************** *******
ja************* *@telusTELUS.ne t
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security

Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
10354
by: Jay McGrath | last post by:
Does anyone know if it is possible to prevent a user from accessing the tables in an MDE file? I can go to my start-up menu and limit access to various functions, etc. I could even disable the 'close' button on the forms. However, all a user has to do is hold the SHIFT key down while launching the MDE application to bypass the start-up menu. I would like to limit any kind of data access (add/delete/modify) through the forms that I...
7
3272
by: Norm | last post by:
Hi All, I have an MDB file which I want to remain secure. It checks for certain parameters upon startup, and will automatically exit if the program is opened/executed by an unauthorized user. My concern is that somebody could read the MDB file using a utility such as MDB Tools (http://mdbtools.sourceforge.net/) and then export the data from my file. I have not used this tool, so is that actually possible using this or some other...
3
1452
by: Gerry Abbott | last post by:
I have ODE 2000, as well as other versions of Office. Currently i install and split solutions into mde Fe and mdb Be files at clients site. Then for updates (which exclude changes to the data) i package the new mde, and a readme, and sometimes a video or help files into an install exe. I then post it to my website and provide the user with a link to download and insall it. . It puts a shortcut to the files where i define, program files,...
3
1997
by: Tim Marshall | last post by:
My A2003 is set up so that the default file format is Access 2000 (options, advanced tab). I've just tried to make my first A2003 mdb into an mde and I get an error saying: "you cannot create a <mdb name> ADE or MDE from a dtabase saved in <mdb name> 2000 format." Also, in help there's a curious note I simply don't understand which I've reproduced below (help on mde, "About ADE & MDE files"). I'm a former A97 developer, can someone...
1
2052
by: Ron Nolan | last post by:
I am building an application using Access 2002. It will consist of two .mdb's, one for the data tables only and the other will be for the forms, queries, reports, macros, & modules only. I know the .mde won't let users get to the external modules section of the container, which provides security. Can they get to the code behind the forms in an .mde? Should both of them be .mde files? What would be the performance advantage of users...
4
3631
by: Jay Mack | last post by:
Hello, I converted an Access application that used to have a MDE front-end (distributed to each user) with a MDB back-end on a share. It now has a MDE front-end with linked ODBC SQL Server 2000 tables as the back-end. Is it a bad practice to place the MDE front-end on a network share instead of sending a copy to each user? I want to do this as a form of cheap security, since the network share has access control on it. Previously, the...
2
1877
by: support | last post by:
We are starting to implement security in an Access DB (Access 2000 and 2003 front ends, SQL 2005 back end via DSN). The problem (or maybe not??) is that when I tried to create an MDE file, it took over 2 hours, keeping the CPU at 99%. I finally gave up around that time and killed the msaccess process. We have a lot of Reports and forms....about what is the normal time? I can make an MDE of an empty DB without any problems. It just...
2
3514
by: larpup | last post by:
When running on A2003 runtime with an mde i receive 3 security warnings. Do you want to block unsafe expresssions. Then another security warning Then, do you want to open this file. This problem does not occur using a full version of A2003. Any suggestions how to avoid these unnecessary questions when using
4
4640
by: Chris | last post by:
How do we create digitally signed MDE files in Access 2007 ? I tried to follow the procedure I was using in other office versions. 1. I installed the Verisign certificate (with private key). 2. Signed the MDB from VBA. 3. Create the MDE. When I try to open the signed MDE, even on the developement machine with
0
9671
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9518
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10433
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10212
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10161
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10000
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7538
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6777
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
3
2919
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.