473,693 Members | 2,530 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Workgroup file at the database level

I am new to securing a database with logins. My questions is: I want
only one database to use a new Workgroup file that I have created, not
all the Access databases that I bring up under my system login. Can
this be done?


Nov 13 '05 #1
1 2529
raydelex wrote:
I am new to securing a database with logins. My questions is: I want
only one database to use a new Workgroup file that I have created, not
all the Access databases that I bring up under my system login. Can
this be done?


It is important to understand how Access User-Level security works. The
security "environmen t" is established when Access itself is launched.
Absolutely no MDB or MDE file is involved at this stage.

Point 1)
Access ALWAYS uses a workgroup file when opened. It either uses the user's
default workgroup or it uses the one specified as a command line argument. This
point gets to your original question. More on this below.

Point 2)
The workgroup file being used when Access opens either has a password applied to
the default user "Admin" or it doesn't. If it does, you are prompted to login.
If it does not then you are not prompted. Again the file or files that you
might want to open haven't entered the picture yet. So if you have made your
default workgroup one that has a password on the Admin user then you are always
prompted to login when you open Access. To avoid this leave your default
workgroup as System.mdw and use a command line argument to specify a different
workgroup only when you need to open a secured file. Most people do this by
creating a shortcut with a Target similar to...

"Path to MSAccess.exe" /wrkgrp "Path to MDW" "Path to MDB"

Point 3)
Once you have Access opened you are now in a "security environment" for that
session. In the context of that session Access now knows who you are and what
groups you belong to in the workgroup file that is being used. If you were not
prompted for a login then you are automatically the user "Admin" who is a member
of the group "Users". You are also "sometimes" a member of the group Admins.
The distinction here is that the group Users is identical in all workgroup
files. This is not true of the group Admins.

You could take 1000 System.MDW files that were created by Microsoft and they
would internally have the same PID for the Admins group. Any user created
workgroup file will always have a different PID. So, when you open a secured
MDB with the default System.MDW you will be a member of the group Admins in that
workgroup, but the file you're opening will not recognize that group as the
*correct* Admins group because the PID is wrong.

Point 4)
Each Access file contains data about what users and what accounts are allowed to
do stuff. The most important being what Users/Groups are allowed to open the
file at all. It doesn't care what workgroup file is being used. It only cares
that the User/Group attempting to do something is one that has permissions to do

Point 5)
Now...we actually attempt to open a particular file. The Access session has the
information about who the current User is and what Groups he belongs to. This
is compared to the information in the file being opened to see if adequate
permissions exist. If they do the file is opened. If not then an error is
raised and the file doesn't open.

Point 6)
What is an "unsecured file"? Basically a file is unsecured if the default user
Admin has full permissions to it or the default group Users has full permissions
to it. Such a file doesn't care what User attempts to open the file as ALL
users are members of the default group Users. This is true of all workgroup
files. You cannot create a user account that is not a member of the default
group Users and the group Users is identified exactly the same in every
workgroup file.

I know the above is rather verbose, but the main point is that User-Level
security is not "attached" to a particular file in the sense that a simple file
password is. You run Access in an environment that is determined by your
workgroup and that environment will let you open some files and not others.
There is no marriage between the MDW and the MDB since any MDW can be used to
open an indefinite number of MDBs and any MDB can be opened by an indefinite
number of MDWs.
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com

Nov 13 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

by: Neil Sargent | last post by:
I have a generic code library, developed as an MDA and distributed as an MDE. It is developed using my system workgroup file. I have a number of applications which use the code library. One of these is secured using its own workgroup file. It is split into a frontend/backend. The backend only has tables and these are all owned by the developer user account with full permissions. The users group account has all permissions except write...
by: Newbillian | last post by:
Is there some way of using vba to automate the processe of joining an Access 97 security workgroup? I typed wrkgadm /? at a command prompt and it just opens the gui, so I'm not sure what the parameters are for the command or whether there really are any command line switches for it. Thank you in advance.
by: Chris Tyson | last post by:
My problem is this: I have created a database, using Workgroup security features. Unique Workgroup. New users added. Permissions to Admins, Admin, and Users revoked. 'Ownership' of database objects has been given to a custom User, and has not been left as owned by Admins. I transfer this file (and its Workgroup) to a shared drive on a LAN. From the original client PC that originated the file, the database cannot be opened without...
by: Larry R Harrison Jr | last post by:
I have an Access 97 secured database which I designed myself. I have the workgroup file and I have been both been trying to access it using a custom shortcut--which I updated to reflect the current filepaths of both the database and workgroup file--and I also tried just manually joining the workgrup file and double-clicking the aplication. I was successful at "joining" the workgroup file. I keep getting 'You Don't Have the Necessary...
by: paulsmith5 | last post by:
Hi, I secured a database a while back using the User-Level Security Wizard. During this process I created a new workgroup file, modified the Admins group by adding a new administrator and removing the original Admin account etc. Users opened up the database using a shortcut which pointed to the new workgroup file. Everything worked out fine. Now I wish to create a new database, with new database objects and apply the same security to...
by: JaBo | last post by:
Our company computers were recently upgraded to Windows XP with Microsoft Office 2003. We have 3 different Access Databases (in different directories on our network) which all require the user to be part of a "Workgroup". It appears that Access 2003 includes some added security features that prevent the user from accessing a database unless you join the workgroup corresponding to the database. This works fine, unless you need to join...
by: Angelo | last post by:
I recently created a workgroup for an access database and it works fine. But I have other versions of that same database (beta copies) for which I didn't create that workgroup file. They have different names than the first DB for which I made the workgroup. But even when I open those beta copies it still launches the workgroup file (system.mdw) and prompts me to login. What do I need to do to revert these changes and go back to the...
by: gazelle04 | last post by:
Can I connect to a workgroup information file (MDW) thru code? I have a user level secured database and I want to automatically connect to the mdw file once I double clicked the database. Is it possible? My purpose is to hide the mdw file from the user although I have given them access to it. I don't want them to know the location of the mdw file so I would like it to hide thru code in Access. There are password cracker software (even...
by: michmcgrath | last post by:
The format is 2000, created using 2002, it is still in development. There is a workgroup file that determines permissions, users login The workgroup and database are located on a network where users gain access to the database through one shortcut that runs the database using the same workgroup file. (this appears to work fine, users login) This is in place to keep users from gaining access to forms, reports and certain features. I have had...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.