473,750 Members | 2,213 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access Security?

Hello All,

What are the best ways to implement security for Access databases (i.e.
..MDB files)?

I ask the question from a general perspective. Why? Well I had written
a prototype database which I split. So I thought that I'd implement
security on it. The security worked great for both groups (i.e. Admins
& Users), but after looking at the detail I took it a little further.

What I did was move the .MDW file that I created in Access 2k.
Afterward both the front and back end database files (.MDB files) that
I created and secured with the .MDW file were accessible. I was able
to change the name of tables. So without spending much more time I
thought that I'd ask the general question from the perspective of only
using .MDB files. I have read about the use of .MDE files, but haven't
looked at them in detail.

I will state that security is relative, and nothing is ever totally
secure. From the brief exposure that I've had it looks like security
really is twofold. If I'm wrong please correct me. First, on network
you have to be able to administer the distribution of a .MDW file to
replace the System.MDW file for users to facilitate the group and user
security within Access. Second, the back end .MDW files can be secured
by the OS's path user's/group's permissions or rights. Also I should
state that I haven't really looked into the .MDW file administration
issue, so I maybe missing a big piece of the puzzle.

I have done some reading and know that I need to read the whole Security
FAQ per http://support.microsoft.com/kb/q207793/, but I thought this
would be a good question to ask the experienced users. I'm not looking
for the great debate, just some good guidance.

Am I looking at this correctly? Am I missing a large piece of the
puzzle? Or what?

Thanks!

--
Regards,

Greg Strong

Nov 13 '05 #1
5 2185
"Greg Strong" <NoJunk@NoJunk4 U².com> wrote in message
news:8b******** *************** *********@4ax.c om...
Hello All,

What are the best ways to implement security for Access databases (i.e.
.MDB files)?

I ask the question from a general perspective. Why? Well I had written
a prototype database which I split. So I thought that I'd implement
security on it. The security worked great for both groups (i.e. Admins
& Users), but after looking at the detail I took it a little further.

What I did was move the .MDW file that I created in Access 2k.
Afterward both the front and back end database files (.MDB files) that
I created and secured with the .MDW file were accessible. I was able
to change the name of tables. So without spending much more time I
thought that I'd ask the general question from the perspective of only
using .MDB files. I have read about the use of .MDE files, but haven't
looked at them in detail.

I will state that security is relative, and nothing is ever totally
secure. From the brief exposure that I've had it looks like security
really is twofold. If I'm wrong please correct me. First, on network
you have to be able to administer the distribution of a .MDW file to
replace the System.MDW file for users to facilitate the group and user
security within Access. Second, the back end .MDW files can be secured
by the OS's path user's/group's permissions or rights. Also I should
state that I haven't really looked into the .MDW file administration
issue, so I maybe missing a big piece of the puzzle.

I have done some reading and know that I need to read the whole Security
FAQ per http://support.microsoft.com/kb/q207793/, but I thought this
would be a good question to ask the experienced users. I'm not looking
for the great debate, just some good guidance.

Am I looking at this correctly? Am I missing a large piece of the
puzzle? Or what?


Hi Greg,

The piece of the puzzle that you're missing is that the default "system.mdw "
should be left alone so that "non-secured" apps can still open and that your
custom workgroup information file (mdw) should be stored on a server where
all of your users can access it. Users would then join your workgroup on a
session by session basis using a desktop shortcut to the mdb with the
"/wrkgrp" switch in the command line. No "administration " of the mdw file
necessary other than the upkeep of the users and groups.

I might add that if you can still open your mdb app without joining your
workgroup then you've missed a step, probably the denying of access to the
"users" group to the database object. My web site has a step-by-step
example which might help your understanding in conjunction with the FAQ.

Access security is good but it can be broken by a determined hacker with the
right tools. If you need "real" security then you need to upsize to
something like Oracle.

HTH - Keith.
www.keithwilby.com
Nov 13 '05 #2
On Fri, 11 Nov 2005 08:52:44 -0000, "Keith W" <he**@there.com > wrote:
The piece of the puzzle that you're missing is that the default "system.mdw "
should be left alone so that "non-secured" apps can still open and that your
custom workgroup information file (mdw) should be stored on a server where
all of your users can access it. Users would then join your workgroup on a
session by session basis using a desktop shortcut to the mdb with the
"/wrkgrp" switch in the command line. No "administration " of the mdw file
necessary other than the upkeep of the users and groups.


Do the users only have read writes to the MDW file on the server? I
don't know where the password is stored. Where ever the password is
stored the user would have to be able to update that file. I'm just
thinking out loud, so correct me if I'm wrong. Thanks!

--
Regards,

Greg Strong
Nov 13 '05 #3
On Fri, 11 Nov 2005 20:44:17 GMT, Greg Strong <NoJunk@NoJunk4 U².com>
wrote:
Do the users only have read writes to the MDW file on the server? I
don't know where the password is stored. Where ever the password is
stored the user would have to be able to update that file. I'm just
thinking out loud, so correct me if I'm wrong.


Per
http://support.microsoft.com/default...#_Toc493299661
the workgroup file includes password, so users would have to have update
permissions/rights.

--
Regards,

Greg Strong
Nov 13 '05 #4
"Greg Strong" <NoJunk@NoJunk4 U².com> wrote in message
news:iu******** *************** *********@4ax.c om...
On Fri, 11 Nov 2005 20:44:17 GMT, Greg Strong <NoJunk@NoJunk4 U².com>
wrote:
Do the users only have read writes to the MDW file on the server? I
don't know where the password is stored. Where ever the password is
stored the user would have to be able to update that file. I'm just
thinking out loud, so correct me if I'm wrong.


Per
http://support.microsoft.com/default...#_Toc493299661
the workgroup file includes password, so users would have to have update
permissions/rights.


Users need RWXD permissions to the folder to where the mdb and mdw reside
and RWX to the files themselves.
Nov 14 '05 #5
Br
Keith W wrote:
"Greg Strong" <NoJunk@NoJunk4 U².com> wrote in message
news:iu******** *************** *********@4ax.c om...
On Fri, 11 Nov 2005 20:44:17 GMT, Greg Strong <NoJunk@NoJunk4 U².com>
wrote:
Do the users only have read writes to the MDW file on the server? I
don't know where the password is stored. Where ever the password is
stored the user would have to be able to update that file. I'm just
thinking out loud, so correct me if I'm wrong.
Per
http://support.microsoft.com/default...#_Toc493299661
the workgroup file includes password, so users would have to have
update permissions/rights.


Users need RWXD permissions to the folder


In order to be able to dynamically create the LDB file....
to where the mdb and mdw
reside and RWX to the files themselves.

--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 14 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

32
2816
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get past Access (or other) security? It'd be interesting to know. And no, I don't have any prejudices. Yours, Mike MacSween
13
3323
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling to rewrite all your code because Microsoft upgraded all their crap and nothing you wrote 10 years earlier works. It doesn't take a rocket scientist to figure out that Microsoft is unreliable. Try opening an Excel 95 spreadsheet you wrote in...
7
1962
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the information for one area. Since the users do not know Access, I created a form to make it easy to generate a report. Is it possible, either when the database is initially opened or when the user clicks on the command button to execute the report, to...
11
2197
by: Will | last post by:
I am looking at using a table with user names, passwords and user rights, which I would administer. I have read a lot about the shortfalls of this and the lack of security but the customer does not wish to use Access security and what they are more focused on is a solution for when a user performs a critical action the system can verify that it is actually that user, e.g. Checks User Name and Password in a table in place of just selecting...
3
1867
by: mar10 | last post by:
I am creating a database in Access 2002 for a small firm that would like security on the tables. They want some employees to have write access only to tables, while others read-only. I have not done anything with security since way back in version '97. I'm reading some white papers I've found to gain knowledge of current security issues. My question is, can I create security problems with other access programs I have created as I...
0
2095
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run or it attempts to perform an action which doe not have the required permissions then its execution...
17
2496
by: DaveG | last post by:
Hi all I am planning on writing a stock and accounts program for the family business, I understand this is likely to take close to 2 years to accomplish. The stock is likely to run into over a thousand items and the accounting side will be used for hopefully many years so the entries are likely to be vast. The delema is what is best to use ase the DB engine, Access I have as part of Office 2002 or should I really be looking at SQL...
38
3902
by: Oldie | last post by:
I have built an MS Access Application under MS Office XP (but I also own MS Office 2000). I have split the application in the pure database tables and all the queries, forms, reports and macro's. Now i want to use this application for different foundations in the Netherlands but I want to secure my application so no one can change it, copy it or steal it from me. I always thought there was a kind of conversion tool that would translate...
23
2650
by: Reggie | last post by:
Hi and TIA. I developed several A2K dbs which are now being run on my clients computer which have been upgraded to Access 03. I'm not sure exactly what they mean but of you know or could point me in a direction to find info on how to prevent and/or fix the db's so that these message don't pop up when the app is started. Error messages below: 1. Microsoft Jet 4.0 service pack 8 must be installed to block unsafe expressions without...
7
2630
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. The users of the database also use other databases therefore I want to secure this database without using the wizard so it does not effect their other databases.
0
9000
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8838
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9577
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9256
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8260
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6804
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4713
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4887
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3322
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.