Is there a quick way to do it?
I'm logged in as the superuser
and owner of database and all
database objects. I would like
to export it to a completely un-
secured application.
Do I have to go through all
objects and security measures
one-by-one the slow and pain-
ful way? 5 1414
Presumably do the opposite of what securing a database does.
Move user Admin back into Admins, with a blank password and give the Admins
group rights to everything. You can multiselect objects you know, shift
click to select All tables, or all forms or whatever. Shouldn't take that
long.
Or if you import into your new user when logged on as the default
Admin/blank password/full rights doesn't that do it all?
Mike
"MLH" <CR**@NorthStat e.net> wrote in message
news:4f******** *************** *********@4ax.c om... Is there a quick way to do it?
I'm logged in as the superuser and owner of database and all database objects. I would like to export it to a completely un- secured application.
Do I have to go through all objects and security measures one-by-one the slow and pain- ful way?
"MLH" <CR**@NorthStat e.net> wrote in message
news:4f******** *************** *********@4ax.c om... Is there a quick way to do it?
I'm logged in as the superuser and owner of database and all database objects. I would like to export it to a completely un- secured application.
Do I have to go through all objects and security measures one-by-one the slow and pain- ful way?
Give full permissions on all objects back to the Users Group (the object
listbox is multi select, so you don't have to do it one by one).
Then rejoin the system.mdw, open Access and create a new database and import
all the objects from you secure mdb.
--
Joan Wild
Microsoft Access MVP
Both seem doable to me.
Guess I'll try Joan's suggestion,
then your's, Mike. Ladies first.
"MLH" <CR**@NorthStat e.net> wrote in message
news:2k******** *************** *********@4ax.c om... Both seem doable to me. Guess I'll try Joan's suggestion, then your's, Mike. Ladies first.
And considerably more experience too, I suspect <g>
I don't know about you, but I can guarantee a lot more than I have.
xxxxxxxxxxxxxxx xxxxxxxxxxxxxxx x And considerably more experience too, I suspect <g> This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Ed Jaffe |
last post by:
All:
1) Could any one show me any website which is using asp, ssl, sql server?
2) Is ASP/IIS technology good enough to create a commerical secured internet
web application?
3) People said most of the secured internet web application (e.g.
banking...) is using java, is that true?
Simon
|
by: Jonas Daunoravicius |
last post by:
I currently have a SSL domain where the SSL cert is applied to the
whole FQDN. So, the whole domain is https://***. Also, we have
another domain that does not have SSL. Using ASP, vbscript, and html,
I'm linking certain logos and pdf files from the unsecured domain to
the secured domain.
The problem is that when a user logs in the secured site and goes to
that specific page that has the logo that is pulled from http://***,
the...
|
by: Joe |
last post by:
Hi,
We want to build a couple of secured pages which will be viewable only to
those who have an account. One way of implementing the security is using
session cookies (temporary cookies). When a user logs in a session cookie is
created. When the browser window is closed the session cookie disappears.
This way when the browser is closed the session is over. So that even if one
tries to copy and past the URL of a secured page, they...
|
by: Oreo Bomb |
last post by:
I have a secured database that contains a Read-Only group. This group
has permissions to view reports, but cannot add, edit, or delete any
DB objects. One of the reports the group needs access to is generated
with a Make-Table Query. Since the Make-Table Query deletes the
previous table it created everytime it's ran, this poses a problem
since the Read-Only group doesn't have the permission to delete
objects. This causes the report...
|
by: xunitinmullik |
last post by:
Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access.
So let the access application be xxx.mdb. After completing the whole
development for xxx.mdb, i secured it using the procedure...
| |
by: TK |
last post by:
Excuse me for multiple posting because I've posted this message to
aspnet.security NG but have not got any response yet.
I'm building an ASP.NET application works in Forms Authentication mode with
custom user account database. And it shows clients a list of hyperlinks to
content pages located in some separated subfolders. This application and
content pages are entirely secured, so everyone must logon to the
application. The application...
|
by: James |
last post by:
I have a VB windows forms application that accesses a Microsoft Access
database that has been secured using user-level security. The
application is being deployed using No-Touch deployment. The objective
in utilizing this new deployment method is to reduce the maintenance
overhead as well as making it easier for my users to setup and run the
application initially. I have VS 2002, Windows XP, Access XP(2000
format).
He is my problem....
|
by: MLH |
last post by:
The guy I've given it to is running Access 2003. He says he
tries to open the file and is presented with a message to the
effect that he doesn't have permission. He tried it with 2002
and it told him he had to join a workgroup to do it. Have I
missed something in my effort to completely unsecure the
A97 app? Well, obviously, I have. But I'm at a loss as to what.
|
by: aklein |
last post by:
I was given a database to update and am running into the following
problem:
The database appears to have been secured using Access security (it is
an MDB, not MDE). Every form etc that I try to open (in the
development environment) gives me 2 messages:
1) "You do not have exclusive access to the database at this time
etc."
2) "You don't have permission to read frmWhatever... etc."
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |