473,659 Members | 2,872 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Database Security

Ant


I am trying to apply security to a database I have just finished. The
application is split into a back end of tables and a front end of forms etc.
I need some users to have access to forms based on some queries but not
others. My question is do I run the security wizard in the back end DB or
the front end? If I just do the front end I seem to have more control
(Queries, individual forms etc) but what’s to stop some one just opening the
back end DB. If I run the security wizard on the back end I can block
access to tables but not queries or forms. If I ran it in both I feel both
me and Access would get confused

As you can probably guess it’s the first time I have applied security levels
in a DB but I need to get it right first time. Thanks for any suggestions

Nov 13 '05 #1
4 1725
The point is you want to secure the application, so you must secure both
front and backends. Access won't get confused...

Some tips on Access security I put together for my Blog in May follow.
--

Tony D'Ambra
Web Site: aadconsulting.c om
Web Blog: accessextra.net

Effective MS Access Security?

Did you know that:

1. You can access the Start-Up properties (such as disabling the Shift key
bypass) of an .mde through an .mdb and change each property

2. You can open an .mde with the Shift key, press Ctrl+G to open the Debug
window, press F2 to open the Object Browser, and then search all the code
modules and constants.

3. You can import all the form and report objects but not the code from an
unsecured .mde into an .mdb.

To effectively secure an Access database you MUST demote the Admin user from
the Admins group. Otherwise your database will not be secure, as Admin
cannot be removed from the Users group, and anyone using the retail
system.mdw file logs on automatically as Admin.

Securing An Access Database

1. Use the Access Workgroup Administrator (AWA), wrkgadm.exe, to create a
new workgroup (.mdw) file.

2. Join the new workgroup using the AWA.

3. Open Access and the database to be secured.

4. Using Tools, Security, User and Group Accounts..., in the User and Group
Accounts dialog:

4.1 Create a password for Admin user.

4.2 Create a new user account. This account will be the new database owner
account. For example, call the owner account DBOwner. Add "DBOwner" to all
groups, including the critical Admins group.

5. Close and re-open Access, logging on as "DbOwner", and leaving the
password blank, as you have not assigned one yet.

7. In the User and Group Accounts dialog, demote the Admin user account by
removing it from the Admins group. Now Admin is only a member of the Users
group and will have only those permissions assigned to that group by
"DBOwner".

8. Create a password for "DBOwner".

9. Close and re-open Access, logging on as "DBOwner" using the password you
created in step 8.

10. You can now start to secure the objects in you database.

Special Notes:

* A User account inherits the permissions of the Group to which it belongs.

* In Access 2000 and later, if you are not creating an .mde, you also need
to secure your code by using Password Protection in the VBA Editor.
"Ant" <an*******@virg in.net> wrote in message
news:C1******** *********@newsf e1-win.ntli.net...


I am trying to apply security to a database I have just finished. The
application is split into a back end of tables and a front end of forms
etc.
I need some users to have access to forms based on some queries but not
others. My question is do I run the security wizard in the back end DB or
the front end? If I just do the front end I seem to have more control
(Queries, individual forms etc) but what’s to stop some one just opening
the
back end DB. If I run the security wizard on the back end I can block
access to tables but not queries or forms. If I ran it in both I feel
both
me and Access would get confused

As you can probably guess it’s the first time I have applied security
levels
in a DB but I need to get it right first time. Thanks for any suggestions

Nov 13 '05 #2
I'm new to Access security and have a couple of questions if anyone can
help. From what I've read, after a database is secured, the Access
application itself has to be logged on to. Does this effect other
databases on the same machine?

How does security work in a shared network environment? Is the .mdw
file shared on the network?

Nov 13 '05 #3
On 5 Jan 2005 16:17:17 -0800, "Wayne" <cq*******@volc anomail.com>
wrote:
I'm new to Access security and have a couple of questions if anyone can
help. From what I've read, after a database is secured, the Access
application itself has to be logged on to. Does this effect other
databases on the same machine?
If you change the default workgroup for Access (which the wizard
*does*), then yes, other databases are affected. If, on the other
hand, you properly customize a shortcut to log onto a workgroup and
launch your database, then other databases are not affected.

How does security work in a shared network environment? Is the .mdw Very well...
file shared on the network?

Proper location is on a network share where all users have full
read-write permission.

See the website in my signature for several good explanations.

*************** *******
ja************* *@telusTELUS.ne t
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security
Nov 13 '05 #4
Thanks for the info Jack.

Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
1108
by: Steve | last post by:
I am planning on deploying a fairly unsophisticated web application using ASP. The app will read a user's record from an Access database stored on the web server (the database file will not be anywhere within wwwroot), display the contents of the record (in a pre-filled out form) to the user, allow the user to makes any changes in the form, and then submit the form information, which would then be written to a new database. My question...
0
2159
by: valexena | last post by:
What are two components of the Oracle database security model? -- Posted via http://dbforums.com
5
1288
by: Paul .V. | last post by:
I have read many long articles in this group about securing my database for distribution. This is the advise I have taken: 1. Hardcoded the purchasing company's name into the program. The limitations are that the company can't get a instant download as I need to manually code their name. That's fine for now. 2. Make both the front and the backend databases MDE. This protects my code.
4
1705
by: Pecanfan | last post by:
I've got quite a large database which is totally form-driven at the moment. I now need to allow multiple users access to various parts of it and, frankly, I'm not prepared waste my time with Access's inbuilt Workgroup 'security features' - it just seems way too clunky. I figured a more sensible move would be to port over to SQL and drive it from a nice web front end. Unfortunately my MS SQL experience is pretty much nil and my web...
1
1205
by: Hot Tracker | last post by:
Looking for a consultant with solid experience in application and database security for a project in the GTA. CONTACT --------------------------------------------------- Please send your resume to: hottracker@hotmail.com
29
2136
by: Martin | last post by:
Sorry, the prior message was multi-posted. Here's a cross-posted version. Please disregard the other one. Is there a way to create and encrypted database file? What do people do when data security is important at the file level? In other words, you don't want anyone to be able to take the database file (or files) and extract data from them.
5
4304
by: isideveloper | last post by:
I'm building a new C# web application that will provide my company some administrative operations that were previously only completed by tweaking the data in the database. 1. Encrypted password authentication 2. "Group" level permissions that allow permission overrides for specific users 3. Ability to set permissions to view, edit, and read only - by user or role. 4. Ability to set permissions based on data - certain users can only see
1
1329
by: Prasu TKP | last post by:
I have developed an Access Application and given to the pople to work through 'Share folder'. There are six people using every day. I have disabled the byepass key also. Very recently one peson copy this application and down loaded to another Access Database. Security wise it is serius Issue. Please let me know how to prevent download Access objects to other database.
0
1165
by: gerryis2000 | last post by:
Hi, i used the security wizard to set security on a adatabase. when i copied it to another computer, the database refused to open though i had copied all the security file, backup file and the security enabled password. coming back to my computer i decided to cut off the security file and try opening the same data base but it refused. i then re-stored the security file that i had cut but still it gives me error message that i do not have the...
0
8427
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8851
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8746
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8525
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8627
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7356
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5649
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
2
1975
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1737
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.