473,657 Members | 2,515 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

a2k - does supporting multiple users imply use of Access security?

i.e the best way to have multiple validated users on the system who can then
access the back-end? Or is it just as easy to write your own user
management and login form and base your code on that?
--

Nov 13 '05 #1
3 1558
Deano wrote:
i.e the best way to have multiple validated users on the system who
can then access the back-end? Or is it just as easy to write your
own user management and login form and base your code on that?


Having multiple users and implementing User Level Security have little to do
with each other. Only if you want different users to have different
permissions to certain areas of the app does ULS become a requirement. If
you just want to track user-names (who did what) then you can use an API
function to retrieve the Windows networking user name without bothering to
sett up Access security.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
Rick Brandt wrote:
Deano wrote:
i.e the best way to have multiple validated users on the system who
can then access the back-end? Or is it just as easy to write your
own user management and login form and base your code on that?


Having multiple users and implementing User Level Security have
little to do with each other. Only if you want different users to
have different permissions to certain areas of the app does ULS
become a requirement. If you just want to track user-names (who did
what) then you can use an API function to retrieve the Windows
networking user name without bothering to sett up Access security.


I'm mainly thinking about how I write the code to allow each user to access
the data. If I use ULS does that make development easier in implementing my
locking strategy etc?

Else if I use my existing login form I can differentiate users and work out
who's doing what at any one time. I think I would prefer this as I'm set
for alot of rewriting a good solid, working single-user app over the next
few months. Access security is one step that would be nice to leave out if
it's a luxury and only really needed if I want to lock down the data in the
mdb.

I'm still horribly naive about multi-user issues so forgive me for appearing
dense.

--
Nov 13 '05 #3
Deano wrote:
I'm mainly thinking about how I write the code to allow each user to
access the data. If I use ULS does that make development easier in
implementing my locking strategy etc?

Else if I use my existing login form I can differentiate users and
work out who's doing what at any one time. I think I would prefer
this as I'm set for alot of rewriting a good solid, working
single-user app over the next few months. Access security is one
step that would be nice to leave out if it's a luxury and only really
needed if I want to lock down the data in the mdb.

I'm still horribly naive about multi-user issues so forgive me for
appearing dense.


If you want your login to "provide guidance" then a home-grown system like
you have is fine. If you want something with some teeth then you have to
implement User Level Security and even that can be hacked by someone
determined to do so.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
3299
by: rdh | last post by:
Hi all, I am in process of developing a Server in C++ supporting multiple protocols. The server will be exposing various functionalities, and the clients can communicate over any of the protocols may be TCP, IPX, SAP, NETBEUI to access the server to access the functionalities exposed. The server doesnot know in advance which client is using what protocol. ALSO, ALL THE INTERACTION WILL BE MADE OVER XML. example my server has...
48
8878
by: Nirvana | last post by:
How to make the font size constant in HTML code, so that in a web browser it remains fixed. For e.g in IE if you press CTRL and move mouse wheel front or back the font size changes, cheers
1
4837
by: mary | last post by:
I am developing an Access db which will be used by multiple users. My questions are: Does MS Access have problems with multiple users accessing the db at once? If yes, what is your solution to this problem? I was informed that Access is not a good application for multiple users accessing it at once.
1
4366
by: intl04 | last post by:
Are there any problems with multiple user access to the same Access database on a shared network drive? I have 'shared' chosen for 'default open mode'. As for the record locking properties, I selected 'edited record' for default record locking; also, 'Open databases using record-level locking' is checked. We seemed to experience difficulties in this office - just once so far, I think - with more than one user accessing the database on a...
6
4984
by: James Radke | last post by:
Hello, I have a multithreaded windows NT service application (vb.net 2003) that I am working on (my first one), which reads a message queue and creates multiple threads to perform the processing for long running reports. When the processing is complete it uses crystal reports to load a template file, populate it, and then export it to a PDF. It works fine so far....
20
6590
by: Keith G. Murphy | last post by:
I'm trying to get a feel for what most people are doing or consider best practice. Given a mod_perl application talking to a PostgreSQL database on the same host, where different users are logging onto the web server using LDAP for authentication, do most people 1) have the web server connecting to the database using its own user account (possibly through ident), and controlling access to different database entities strictly through...
89
6035
by: Cuthbert | last post by:
After compiling the source code with gcc v.4.1.1, I got a warning message: "/tmp/ccixzSIL.o: In function 'main';ex.c: (.text+0x9a): warning: the 'gets' function is dangerous and should not be used." Could anybody tell me why gets() function is dangerous?? Thank you very much. Cuthbert
3
1347
by: TClancey | last post by:
Hi all. I have an app that needs to connect to either - an Access database, MySql database or MsSql database. It will be the end users decision which they want to use. I've done a lot of work with Access in the past, and a good deal with MySql and realise that there are syntax issues between these two back ends. I haven't done a great deal with MsSql yet, but I would imagine that syntax is going to be an issue here as well.
113
5255
by: John Nagle | last post by:
The major complaint I have about Python is that the packages which connect it to other software components all seem to have serious problems. As long as you don't need to talk to anything outside the Python world, you're fine. But once you do, things go downhill. MySQLdb has version and platform compatibility problems. So does M2Crypto. The built-in SSL support is weak. Even basic sockets don't quite work right; the socket module...
0
8844
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8518
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8621
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
6177
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4173
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4330
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2743
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1971
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1734
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.