Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on the
local install directory, and use the command line parameters of the shortcut
to point the database file to this file, when starting up.
I want to keep my installations separate from other access databases on the
client's machines, that;s why i'm using the command line to link with the
mdw file.
There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.
Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Can the back end inherit the security using the the splitter, even across
the Lan.
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'
Thanks in advance.
Gerry Abbott
-- 3 1406
Still hoping that someone will answer my post.
I have looked at old threads and found a very userful one, which clarifies
where the MDW files should be placed in a multi-user environment, and it
touches on the need to assign permissions to the table links, of a linked
file. But my questions below remain unanswered. http://groups.google.com/groups?hl=e...nbbsa03#link10
Gerry Abbott
"Gerry Abbott" <pl****@ask.i e> wrote in message
news:oI******** ***********@new s.indigo.ie... Hi all. I've been getting my head around user-level security, and pretty much have the hang of how to give defined access to different users. However I normally implement using and MDE for the FE,on a local machine and an MDB for the backend on a server drive. I intend to have a local mdw file on the local install directory, and use the command line parameters of the shortcut to point the database file to this file, when starting up.
I want to keep my installations separate from other access databases on the client's machines, that;s why i'm using the command line to link with the mdw file.
There are two ways for me to create the backend file, either copy the full file, and remove all except the tables, then remove all the tables in the front end, and link them from he backend. Or , use the database splitter.
Couple of questions for someone with experience of this. Which one is going to be best to maintain the security. Can the back end inherit the security using the the splitter, even across the Lan. If not, then how do I get the backend to refer to the local mdw file, or does this remain fixed for the access 'session'
Thanks in advance.
Gerry Abbott
--
On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.i e>
wrote: Hi all. I've been getting my head around user-level security, and pretty much have the hang of how to give defined access to different users. However I normally implement using and MDE for the FE,on a local machine and an MDB for the backend on a server drive. I intend to have a local mdw file on the local install directory, and use the command line parameters of the shortcut to point the database file to this file, when starting up.
A shared MDW is easier to maintain instead of a multitude of MDW's on
the local machines. (if that is what you meant...)
Using the shortcut to specify the MDW is the correct way to do it. I want to keep my installations separate from other access databases on the client's machines, that;s why i'm using the command line to link with the mdw file.
There are two ways for me to create the backend file, either copy the full file, and remove all except the tables, then remove all the tables in the front end, and link them from he backend. Or , use the database splitter.
Couple of questions for someone with experience of this. Which one is going to be best to maintain the security.
Do it manually.
Can the back end inherit the security using the the splitter, even across the Lan.
LAN is irrelevant. Apparently the splitter fails to properly apply
security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or does this remain fixed for the access 'session'
Each Access session is controlled by an MDW. The backend will use the
accounts from whatever MDW was used to launch Access. Matters not
whether you open Access, then open the FE or open Access, then open
the BE. In both cases, the MDW that you used to launch Access controls
the permissions on the BE.
Check the paper on the website in my signature for additional
information. Thanks in advance.
Gerry Abbott
*************** ******* ja************* *@telusTELUS.ne t
remove uppercase letters for true email http://www.geocities.com/jacksonmacd/ for info on MS Access security
Thanks Jack,
Nice paper, great help.
Regards,
Gerry Abbott
"Jack MacDonald" <ja************ **@telus.net> wrote in message
news:uv******** *************** *********@4ax.c om... On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.i e> wrote:
Hi all. I've been getting my head around user-level security, and pretty much have the hang of how to give defined access to different users. However I normally implement using and MDE for the FE,on a local machine and an MDB for the backend on a server drive. I intend to have a local mdw file on the local install directory, and use the command line parameters of the shortcut to point the database file to this file, when starting up.
A shared MDW is easier to maintain instead of a multitude of MDW's on the local machines. (if that is what you meant...)
Using the shortcut to specify the MDW is the correct way to do it.
I want to keep my installations separate from other access databases on the client's machines, that;s why i'm using the command line to link with the mdw file.
There are two ways for me to create the backend file, either copy the full file, and remove all except the tables, then remove all the tables in the front end, and link them from he backend. Or , use the database splitter.
Couple of questions for someone with experience of this. Which one is going to be best to maintain the security.
Do it manually.
Can the back end inherit the security using the the splitter, even across the Lan.
LAN is irrelevant. Apparently the splitter fails to properly apply security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or does this remain fixed for the access 'session'
Each Access session is controlled by an MDW. The backend will use the accounts from whatever MDW was used to launch Access. Matters not whether you open Access, then open the FE or open Access, then open the BE. In both cases, the MDW that you used to launch Access controls the permissions on the BE.
Check the paper on the website in my signature for additional information.
Thanks in advance.
Gerry Abbott
*************** ******* ja************* *@telusTELUS.ne t remove uppercase letters for true email http://www.geocities.com/jacksonmacd/ for info on MS Access security This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Jay McGrath |
last post by:
Does anyone know if it is possible to prevent a user from accessing
the tables in an MDE file? I can go to my start-up menu and limit
access to various functions, etc. I could even disable the 'close'
button on the forms. However, all a user has to do is hold the
SHIFT key down while launching the MDE application to bypass the
start-up menu.
I would like to limit any kind of data access (add/delete/modify)
through the forms that I...
|
by: Norm |
last post by:
Hi All,
I have an MDB file which I want to remain secure. It checks for certain
parameters upon startup, and will automatically exit if the program is
opened/executed by an unauthorized user.
My concern is that somebody could read the MDB file using a utility such as
MDB Tools (http://mdbtools.sourceforge.net/) and then export the data from
my file. I have not used this tool, so is that actually possible using
this or some other...
|
by: Gerry Abbott |
last post by:
I have ODE 2000, as well as other versions of Office.
Currently i install and split solutions into mde Fe and mdb Be files at
clients site. Then for updates (which exclude changes to the data) i package
the new mde, and a readme, and sometimes a video or help files into an
install exe. I then post it to my website and provide the user with a link
to download and insall it. . It puts a shortcut to the files where i define,
program files,...
|
by: Tim Marshall |
last post by:
My A2003 is set up so that the default file format is Access 2000
(options, advanced tab). I've just tried to make my first A2003 mdb
into an mde and I get an error saying: "you cannot create a <mdb name>
ADE or MDE from a dtabase saved in <mdb name> 2000 format."
Also, in help there's a curious note I simply don't understand which
I've reproduced below (help on mde, "About ADE & MDE files").
I'm a former A97 developer, can someone...
|
by: Ron Nolan |
last post by:
I am building an application using Access 2002.
It will consist of two .mdb's, one for the data tables only and the
other will be for the forms, queries, reports, macros, & modules only.
I know the .mde won't let users get to the external modules section of
the container, which provides security. Can they get to the code behind
the forms in an .mde?
Should both of them be .mde files?
What would be the performance advantage of users...
| |
by: Jay Mack |
last post by:
Hello,
I converted an Access application that used to have a MDE front-end
(distributed to each user) with a MDB back-end on a share. It now has a
MDE front-end with linked ODBC SQL Server 2000 tables as the back-end.
Is it a bad practice to place the MDE front-end on a network share
instead of sending a copy to each user? I want to do this as a form of
cheap security, since the network share has access control on it.
Previously, the...
|
by: support |
last post by:
We are starting to implement security in an Access DB (Access 2000 and
2003 front ends, SQL 2005 back end via DSN).
The problem (or maybe not??) is that when I tried to create an MDE
file, it took over 2 hours, keeping the CPU at 99%. I finally gave up
around that time and killed the msaccess process.
We have a lot of Reports and forms....about what is the normal time? I
can make an MDE of an empty DB without any problems. It just...
|
by: larpup |
last post by:
When running on A2003 runtime with an mde i receive 3 security
warnings.
Do you want to block unsafe expresssions.
Then another security warning
Then, do you want to open this file.
This problem does not occur using a full version of A2003.
Any suggestions how to avoid these unnecessary questions when using
|
by: Chris |
last post by:
How do we create digitally signed MDE files in Access 2007 ?
I tried to follow the procedure I was using in other office versions.
1. I installed the Verisign certificate (with private key).
2. Signed the MDB from VBA.
3. Create the MDE.
When I try to open the signed MDE, even on the developement machine
with
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
| |
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |