RE: Access 2002 SP3
I have an app "App1.mdb" that has internal security built-in via a
table: tblSecurity. In this table a match is obtained to see if they
are authorized to use the app.
This application has no Jet security being used ("Users/Groups", etc.)
One of the requirements was to hide the DBWindow completely from the
users, which works fine and the DBwindow is secure from all users.
Another requirement for App1.mdb: the users need to create ad-hoc
reports in the report designer area of this app.
Is there a way to create a second .mdb "App2.mdb" that links to the
tables in App1.mdb, but with purely read-only capability?
Any counsel is appreciated.
Thank you. 7 2471
TechBoy <ro******@msn.c om> wrote: RE: Access 2002 SP3
I have an app "App1.mdb" that has internal security built-in via a table: tblSecurity. In this table a match is obtained to see if they are authorized to use the app. This application has no Jet security being used ("Users/Groups", etc.)
One of the requirements was to hide the DBWindow completely from the users, which works fine and the DBwindow is secure from all users. Another requirement for App1.mdb: the users need to create ad-hoc reports in the report designer area of this app.
Is there a way to create a second .mdb "App2.mdb" that links to the tables in App1.mdb, but with purely read-only capability?
Any counsel is appreciated.
Thank you.
To do it properly you'd need to implement obviously workgroup security.
--
regards,
Bradley
A Christian Response http://www.pastornet.net.au/response To do it properly you'd need to implement obviously workgroup
security<<
I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:
MyApp.mdb and MyAppData.mdb.
The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.
MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup
security in MyApp.mdb or MyAppData.mdb for the users to have pure
"read-only" accessibility to all table for creating adhoc
reports/queries?
Thanks.
*** Sent via Developersdex http://www.developersdex.com ***
RLN wrote: To do it properly you'd need to implement obviously workgroup security<<
I have never worked with Jet security before. Is it pretty straightforward or are there some resources that would be helpful in walking me through setting it up? Reason I ask is, I have my application broke up into 2 .mdb files:
MyApp.mdb and MyAppData.mdb.
The data version has all the tables only, while the other has all the forms, controls, modules, report, etc.
MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup security in MyApp.mdb or MyAppData.mdb for the users to have pure "read-only" accessibility to all table for creating adhoc reports/queries?
If you go with User Level Security you would need it on BOTH files.
Security is controlled by the workgroup file and there is only one of those
per Access session so the file you open directly and any file that is has
links to are all affected by it.
If you want ALL users to be read only you can simply place the data file in
a folder where they have read-only permissions. If you want some to be
limited to read only and others to be able to edit data, then User Level
Security is the way to go. Network permissions cannot be used for that.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com To do it properly you'd need to implement obviously workgroup
security<<
One more thing I forgot to mention that had me concerned on this
subject.
Before, I tried to set up some user security. When I did that, my app
prompted me for a username and pass, which was fine. The only thing
wrong with that was that after I set that up on the other PC here in my
cube, every time I would launch Access (ver. 2002) on that other PC,
**any** database file I would open up (even ones created a long time
ago) would prompt me for that username and pass I had only wanted to use
for my current application I mentioned earlier in this my first reply.
So I guess my concern is when you mentioned setting up workgroup
security, I thought 'oh gee, here I go again....I'll set this up on this
2nd machine and when Access tries to open *any* .mdb, I'll be prompted
for a password."
So my hesitancy on this whole workgroup security thing is wrapped around
the fact that Access made me log in to all databases, not just the one I
really need security for.
I'll search for some info on this, but if anyone has other words of
wisdom for me, I'm still reading......
Thanks.
----------
"Perseveran ce - there is no substitute for hard work."
- Thomas Alva Edison
*** Sent via Developersdex http://www.developersdex.com ***
RLN wrote: To do it properly you'd need to implement obviously workgroup security<<
One more thing I forgot to mention that had me concerned on this subject. Before, I tried to set up some user security. When I did that, my app prompted me for a username and pass, which was fine. The only thing wrong with that was that after I set that up on the other PC here in my cube, every time I would launch Access (ver. 2002) on that other PC, **any** database file I would open up (even ones created a long time ago) would prompt me for that username and pass I had only wanted to use for my current application I mentioned earlier in this my first reply. [snip]
That only happens if you tell the security wizard that you want to make the
new secured workgroup file your default workgroup file. Login prompts are
dictated by the workgroup, not the MDB file being opened. If you tell the
wizard to create a special shortcut for your secured app then you are only
prompted for a login when you use that shortcut.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Hi, Rick. If you want ALL users to be read only you can simply place the data file in a folder where they have read-only permissions. If you want some to be limited to read only and others to be able to edit data, then User Level Security is the way to go. Network permissions cannot be used for that.
Actually, they can. The trick is that you have to grant write
permissions to all users for the _folder_ in which the .mdb file
resides (so they can manipulate the .ldb file) and then set the
permissions to read-only or read/write on the .mdb file itself.
So, if you have "thing.mdb" in a folder called "foo" and two groups of
users, "ReadUsers" and "ChangeUser s", then the required permissions
are...
on the folder "foo": _both_ "ReadUsers" and "ChangeUser s" need
read/write permissions
on the file "thing.mdb" : give "ChangeUser s" read/write and give
"ReadUsers" read-only permissions
Gord
Rick Brandt <ri*********@ho tmail.com> wrote: RLN wrote: To do it properly you'd need to implement obviously workgroup security<< I have never worked with Jet security before. Is it pretty straightforward or are there some resources that would be helpful in walking me through setting it up? Reason I ask is, I have my application broke up into 2 .mdb files:
MyApp.mdb and MyAppData.mdb.
The data version has all the tables only, while the other has all the forms, controls, modules, report, etc.
MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup security in MyApp.mdb or MyAppData.mdb for the users to have pure "read-only" accessibility to all table for creating adhoc reports/queries?
If you go with User Level Security you would need it on BOTH files. Security is controlled by the workgroup file and there is only one of those per Access session so the file you open directly and any file that is has links to are all affected by it.
If you want ALL users to be read only you can simply place the data file in a folder where they have read-only permissions. If you want some to be limited to read only and others to be able to edit data, then User Level Security is the way to go. Network permissions cannot be used for that.
Although to confuse things you can use two different workgroup files.
One contains your users, the other the design admins. This way there is
physically no way anyone can login to gain access to your design (tables
usually as I distribute MDE frontends). Of course my user groups have
been created exactly the same in each workgroup else it won't work.
(Although again a simple tool will break the security anyway if one was
really keen to gain access:)
--
regards,
Bradley
A Christian Response http://www.pastornet.net.au/response This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Gunnar |
last post by:
Hello, I've just written a CPP program that reads integers from a
binary file, and used this code
while (my_ifstram.read( (char* ) &number, sizeof(int))
{
// do something with number
}
My question is now, where can I find a manual that describes what
the read method does with the ifstream object?
I'm sitting here with my Linux/Debian machine, but I have not found any
|
by: Steve |
last post by:
Hi,
I'm trying to convert a file reading loop into one using streams. The BSD OS
read API returns the number of bytes read, but istream::read returns itself.
How can I find out the number of bytes actually read?
What the code fragment should do is read up to 1000 bytes into a buffer, or
finish early if reading failed. Just your average read loop.
I have: (this is a simplified version; I know there's no detailed error
|
by: Steven T. Hatton |
last post by:
I know of a least one person who believes std::ifstream::read() and
std::ofstream::write() are "mistakes". They seem to do the job I want
done. What's wrong with them. This is the code I currently have as a test
for using std::ifstream::read(). Is there anything wrong with the way I'm
getting the file?
#include <vector>
#include <iomanip>
#include <fstream>
#include <iostream>
|
by: Sandman |
last post by:
Just looking for suggestion on how to do this in my Web application.
The goal is to keep track of what a user has and hasn't read and present him or
her with new material
I am currently doing this by aggregating new content from all databases into a
single indexed database and then saving a timestamp in the account database
(for the current user) that tells me when the user last read items in the
aggregated database.
|
by: Andrea Bauer |
last post by:
Hallo,
wie kann ich so eine Datei unter .Net schreiben C++ oder C#.
Bitte mit Funktionsaufrufen. Vielen Dank.
Grüße Andrea
<Product>
<ProgramNumber>2</ProgramNumber>
| |
by: Ollie Cook |
last post by:
Hi,
I am having some difficulty with read(2) and interrupting signals. I
expect I am misunderstanding how the two work together, so would
appreciate some guidance.
I am trying to 'time out' a socket read after a certain delay. The logic
is (I will provide a test program below):
- create and connect socket
|
by: Jose Reckoner |
last post by:
I'm running python 2.3 on Windows XP. Anyone have a quick small script
to convert .DT1 and .DEM data to ASCII or some other format? I don't
need a viewer.
Thanks!
|
by: phplasma |
last post by:
Hey,
I am currently attempting to implement a multi-threaded C# socket,
using SSL (.pem file/certification/private key combo) server using
Visual Studio C# Express.
I have successfully made the client application establish a connection,
and send data, which appears in plain, de-crypted text on the server -
this works.
|
by: zl2k |
last post by:
hi, there
I have a appendable binary file of complex data structure named
data.bin created by myself. It is written in the following format:
number of Data, Data array
Suppose I have following data.bin (3 Data appended to 2 Data):
2, data0, data1, 3, data0, data1, data2
|
by: Thomas Christensen |
last post by:
This issue has been raised a couple of times I am sure. But I have yet
to find a satisfying answer.
I am reading from a subprocess and this subprocess sometimes hang, in
which case a call to read() call will block indefinite, keeping me from
killing it.
The folloing sample code illustrates the problem:
proc = subprocess.Popen(,
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
| |
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
| |
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |