473,789 Members | 2,926 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to set up read-only accessibility to an existing .mdb

RE: Access 2002 SP3

I have an app "App1.mdb" that has internal security built-in via a
table: tblSecurity. In this table a match is obtained to see if they
are authorized to use the app.
This application has no Jet security being used ("Users/Groups", etc.)

One of the requirements was to hide the DBWindow completely from the
users, which works fine and the DBwindow is secure from all users.
Another requirement for App1.mdb: the users need to create ad-hoc
reports in the report designer area of this app.

Is there a way to create a second .mdb "App2.mdb" that links to the
tables in App1.mdb, but with purely read-only capability?

Any counsel is appreciated.

Thank you.

Nov 13 '05 #1
7 2471
Br
TechBoy <ro******@msn.c om> wrote:
RE: Access 2002 SP3

I have an app "App1.mdb" that has internal security built-in via a
table: tblSecurity. In this table a match is obtained to see if they
are authorized to use the app.
This application has no Jet security being used ("Users/Groups", etc.)

One of the requirements was to hide the DBWindow completely from the
users, which works fine and the DBwindow is secure from all users.
Another requirement for App1.mdb: the users need to create ad-hoc
reports in the report designer area of this app.

Is there a way to create a second .mdb "App2.mdb" that links to the
tables in App1.mdb, but with purely read-only capability?

Any counsel is appreciated.

Thank you.


To do it properly you'd need to implement obviously workgroup security.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #2
RLN
To do it properly you'd need to implement obviously workgroup

security<<

I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup
security in MyApp.mdb or MyAppData.mdb for the users to have pure
"read-only" accessibility to all table for creating adhoc
reports/queries?

Thanks.
*** Sent via Developersdex http://www.developersdex.com ***
Nov 13 '05 #3
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<


I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup
security in MyApp.mdb or MyAppData.mdb for the users to have pure
"read-only" accessibility to all table for creating adhoc
reports/queries?


If you go with User Level Security you would need it on BOTH files.
Security is controlled by the workgroup file and there is only one of those
per Access session so the file you open directly and any file that is has
links to are all affected by it.

If you want ALL users to be read only you can simply place the data file in
a folder where they have read-only permissions. If you want some to be
limited to read only and others to be able to edit data, then User Level
Security is the way to go. Network permissions cannot be used for that.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
RLN
To do it properly you'd need to implement obviously workgroup

security<<

One more thing I forgot to mention that had me concerned on this
subject.
Before, I tried to set up some user security. When I did that, my app
prompted me for a username and pass, which was fine. The only thing
wrong with that was that after I set that up on the other PC here in my
cube, every time I would launch Access (ver. 2002) on that other PC,
**any** database file I would open up (even ones created a long time
ago) would prompt me for that username and pass I had only wanted to use
for my current application I mentioned earlier in this my first reply.

So I guess my concern is when you mentioned setting up workgroup
security, I thought 'oh gee, here I go again....I'll set this up on this
2nd machine and when Access tries to open *any* .mdb, I'll be prompted
for a password."

So my hesitancy on this whole workgroup security thing is wrapped around
the fact that Access made me log in to all databases, not just the one I
really need security for.

I'll search for some info on this, but if anyone has other words of
wisdom for me, I'm still reading......
Thanks.

----------
"Perseveran ce - there is no substitute for hard work."
- Thomas Alva Edison

*** Sent via Developersdex http://www.developersdex.com ***
Nov 13 '05 #5
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<


One more thing I forgot to mention that had me concerned on this
subject.
Before, I tried to set up some user security. When I did that, my app
prompted me for a username and pass, which was fine. The only thing
wrong with that was that after I set that up on the other PC here in
my cube, every time I would launch Access (ver. 2002) on that other
PC, **any** database file I would open up (even ones created a long
time ago) would prompt me for that username and pass I had only
wanted to use for my current application I mentioned earlier in this
my first reply. [snip]


That only happens if you tell the security wizard that you want to make the
new secured workgroup file your default workgroup file. Login prompts are
dictated by the workgroup, not the MDB file being opened. If you tell the
wizard to create a special shortcut for your secured app then you are only
prompted for a login when you use that shortcut.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #6
Hi, Rick.
If you want ALL users to be read only you can simply place the data file in
a folder where they have read-only permissions. If you want some to be
limited to read only and others to be able to edit data, then User Level
Security is the way to go. Network permissions cannot be used for that.


Actually, they can. The trick is that you have to grant write
permissions to all users for the _folder_ in which the .mdb file
resides (so they can manipulate the .ldb file) and then set the
permissions to read-only or read/write on the .mdb file itself.

So, if you have "thing.mdb" in a folder called "foo" and two groups of
users, "ReadUsers" and "ChangeUser s", then the required permissions
are...

on the folder "foo": _both_ "ReadUsers" and "ChangeUser s" need
read/write permissions

on the file "thing.mdb" : give "ChangeUser s" read/write and give
"ReadUsers" read-only permissions
Gord

Nov 13 '05 #7
Br
Rick Brandt <ri*********@ho tmail.com> wrote:
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<
I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the
workgroup security in MyApp.mdb or MyAppData.mdb for the users to
have pure "read-only" accessibility to all table for creating adhoc
reports/queries?

If you go with User Level Security you would need it on BOTH files.
Security is controlled by the workgroup file and there is only one of
those per Access session so the file you open directly and any file
that is has links to are all affected by it.

If you want ALL users to be read only you can simply place the data
file in a folder where they have read-only permissions. If you want
some to be limited to read only and others to be able to edit data,
then User Level Security is the way to go. Network permissions
cannot be used for that.


Although to confuse things you can use two different workgroup files.
One contains your users, the other the design admins. This way there is
physically no way anyone can login to gain access to your design (tables
usually as I distribute MDE frontends). Of course my user groups have
been created exactly the same in each workgroup else it won't work.

(Although again a simple tool will break the security anyway if one was
really keen to gain access:)
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
9004
by: Gunnar | last post by:
Hello, I've just written a CPP program that reads integers from a binary file, and used this code while (my_ifstram.read( (char* ) &number, sizeof(int)) { // do something with number } My question is now, where can I find a manual that describes what the read method does with the ifstream object? I'm sitting here with my Linux/Debian machine, but I have not found any
6
3477
by: Steve | last post by:
Hi, I'm trying to convert a file reading loop into one using streams. The BSD OS read API returns the number of bytes read, but istream::read returns itself. How can I find out the number of bytes actually read? What the code fragment should do is read up to 1000 bytes into a buffer, or finish early if reading failed. Just your average read loop. I have: (this is a simplified version; I know there's no detailed error
12
11666
by: Steven T. Hatton | last post by:
I know of a least one person who believes std::ifstream::read() and std::ofstream::write() are "mistakes". They seem to do the job I want done. What's wrong with them. This is the code I currently have as a test for using std::ifstream::read(). Is there anything wrong with the way I'm getting the file? #include <vector> #include <iomanip> #include <fstream> #include <iostream>
2
3093
by: Sandman | last post by:
Just looking for suggestion on how to do this in my Web application. The goal is to keep track of what a user has and hasn't read and present him or her with new material I am currently doing this by aggregating new content from all databases into a single indexed database and then saving a timestamp in the account database (for the current user) that tells me when the user last read items in the aggregated database.
2
2509
by: Andrea Bauer | last post by:
Hallo, wie kann ich so eine Datei unter .Net schreiben C++ oder C#. Bitte mit Funktionsaufrufen. Vielen Dank. Grüße Andrea <Product> <ProgramNumber>2</ProgramNumber>
4
3847
by: Ollie Cook | last post by:
Hi, I am having some difficulty with read(2) and interrupting signals. I expect I am misunderstanding how the two work together, so would appreciate some guidance. I am trying to 'time out' a socket read after a certain delay. The logic is (I will provide a test program below): - create and connect socket
1
4003
by: Jose Reckoner | last post by:
I'm running python 2.3 on Windows XP. Anyone have a quick small script to convert .DT1 and .DEM data to ASCII or some other format? I don't need a viewer. Thanks!
0
4757
by: phplasma | last post by:
Hey, I am currently attempting to implement a multi-threaded C# socket, using SSL (.pem file/certification/private key combo) server using Visual Studio C# Express. I have successfully made the client application establish a connection, and send data, which appears in plain, de-crypted text on the server - this works.
4
2808
by: zl2k | last post by:
hi, there I have a appendable binary file of complex data structure named data.bin created by myself. It is written in the following format: number of Data, Data array Suppose I have following data.bin (3 Data appended to 2 Data): 2, data0, data1, 3, data0, data1, data2
5
12870
by: Thomas Christensen | last post by:
This issue has been raised a couple of times I am sure. But I have yet to find a satisfying answer. I am reading from a subprocess and this subprocess sometimes hang, in which case a call to read() call will block indefinite, keeping me from killing it. The folloing sample code illustrates the problem: proc = subprocess.Popen(,
0
9666
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10200
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9020
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7529
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6769
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5418
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5551
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4093
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2909
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.