473,657 Members | 2,806 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access Security Questions

I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the PC
itself? That is to say, will the security ask for a user name when
the database is opened, or does it do something with who is signed on
to the PC when the database is opened?

Thanks for the assistance

Nov 13 '05 #1
3 1521
"mar10" <ma****@yahoo.c om> wrote in message
news:11******** **************@ g44g2000cwa.goo glegroups.com.. .
I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the PC
itself? That is to say, will the security ask for a user name when
the database is opened, or does it do something with who is signed on
to the PC when the database is opened?


Access user level security prompts for login when you open the file.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
Br
Rick Brandt <ri*********@ho tmail.com> wrote:
"mar10" <ma****@yahoo.c om> wrote in message
news:11******** **************@ g44g2000cwa.goo glegroups.com.. .
I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the
PC itself? That is to say, will the security ask for a user name
when the database is opened, or does it do something with who is
signed on to the PC when the database is opened?


Access user level security prompts for login when you open the file.


If you're using Access97 or previous Access will prompt you when Access
is opened.
If you're using Access2000 or later Access will prompt you when you open
a database.
....when attached to a non default workgroup file.

Access JET security can't use WindowsNT security. If you use MSSQL or
similar as the backend then you can take advantage of it.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #3
If you're using Access97 or previous Access will prompt you when Access
is opened.
If you're using Access2000 or later Access will prompt you when you open
a database.
...when attached to a non default workgroup file.

Never seen any difference in this respect between A97 and A2k.
If I open A2k with the default workgroup and try to open a secured mdb (using a different workgroup) Access tells me that I don't have the necessary permissions .....
Same with A97 here ...
Same with Access 2.0

If I am 'attached to' or 'using' a different mdw (or mda in previous versions) Access *always* prompts me.
This is just the way the security 'works'.
IME you can even open all your secured mdb's with the same login using different mdw-files for the mdb's.
This, of course, implies that you have created the *same* user with the *same* pid in the different mdw-files ...

Arno R
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
3052
by: Wayne Aprato | last post by:
Does anyone know where I can find a straightforward explanation of Access security? From what I have been able to understand from the small amount that I've read on security, it starts with securing Access itself on the user's PC. Is this the case and how does this affect multiple users on a network?
3
3760
by: Vic | last post by:
Dear All, I have been developing a small access database, but I am new to security concepts with access. This is a multiuser database, I have a table which will be written by various users through a form as an interface. At the moment, there is an authorId field on the form (other details of authors are in a separate table connected to this table with the authorID) , and every user select their initials from a combo for the record they...
16
4866
by: Rob Geraghty | last post by:
I've just spent some time looking through FAQ sites and searching the google archives of this newsgroup, but I still haven't been able to find a clear explanation of an issue with multi-user databases. Essentially I have two questions; 1) Does the system.mdw file have any significance to multi-user sharing of an Access 97 database other than security? 2) Can any number of users open an Access 97 database using the same
2
1846
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a couple of questions. Scenario: I have MyApp.MDB up on a file server. I also have two Client PC's: Client1 and Client2 who use MyApp. (Both Client's are running Access 2002) On Client1's PC:
3
1890
by: Rachel | last post by:
Hi, I am using the data access application block successfully in our development environment, however when I deploy to our testing server as Private Assemblies I keep getting the following Configuration Error Description: An error occurred during the processing of a configuration file required to service this request. Please review the specific error details below and modify your configuration file appropriately.
1
4882
by: Jody Gelowitz | last post by:
We are having an issue in that when trying to read a file that is on Server2 from Server1 (through our ASP.NET project), we receive the error: Access to the path "\\Server2\MyShare\MyFile.tif" is denied. Here is the server setup that we have: Dev - Development Computer on WinXP Pro SP2 (IIS5), VS2003 developing under .NET Framework 1.1 Server1 - Web Server on Win2003 Server (IIS6) Server2 - File Server on Win2003 Server
17
4403
by: Mell via AccessMonster.com | last post by:
Is there a way to find out where an application was created from? i.e. - work or home i.e. - if application sits on a (work) server/network, the IT people know the application is sitting there, but is there a way they can find out if that application was put there from a CD or email or created at work? Hint: It's not on a client/server database, just native jet database mdb created on Access 2003 (default 2000)...
7
1974
by: Visitor No 3 | last post by:
My local Crinkles group(U3A), of which I am one, want me to develop a noddy database and web site for their members. Some are computer literate, others not so. I thought an Access 2000 .mdb on a server from the local council with a web page in Active Server Pages(ASP) and using ADO would do the trick, then one of them could update it at home on the web to keep track of members and somebody else could do the same for current programmes etc....
3
1674
by: Earl Anderson | last post by:
One of the users in our departmental db has Read/Write permissions to a particular form. He was able to access and edit the form at will until 2 weeks ago. His current problem was that he was not able to edit the data (no message ever appeared telling him he could not change any data). The only change to the db since he experienced the problem was that a new version of the db was made available for installation which everyone has now...
0
8403
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8833
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8509
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8610
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7345
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6174
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5636
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4168
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
2
1730
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.