473,840 Members | 1,444 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing both front end and back end

I have a 2K database with a front end linked to a back end. I need to lock
down or secure both ends so a user can not access the raw data in tables
etc. I also need usernames and passwords for 50+ users. I've experimented
with securing the database but can't get it the way I want it. I can still
use the shift key to obtain access. Anyone have a link to a site or
something to give me a guideline as to what I can do?

Thanks
Jan 20 '06 #1
4 3926
You need Jamie's Software - Access Property Editor.

Download from http://www.jamiessoftware.tk/

Jan 20 '06 #2
On Fri, 20 Jan 2006 12:55:10 GMT, "Brad P" <br******@hotma il.com>
wrote:

Well, Access security is better than that. But you'll have to
download, study, and fully understand MSFT's security FAQ before
proceeding.
Yet this Access security can be cracked. If you really need strong
security, Access is not the best platform. But then you already knew
that, because you did your research *before* you started.

-Tom.

I have a 2K database with a front end linked to a back end. I need to lock
down or secure both ends so a user can not access the raw data in tables
etc. I also need usernames and passwords for 50+ users. I've experimented
with securing the database but can't get it the way I want it. I can still
use the shift key to obtain access. Anyone have a link to a site or
something to give me a guideline as to what I can do?

Thanks


Jan 20 '06 #3
I just need to prevent the average user from getting into the backend of my
application. My application doesn't contain critical data. The previous post
with APE may be my ticket. Thanks for that!

"Tom van Stiphout" <no************ *@cox.net> wrote in message
news:hc******** *************** *********@4ax.c om...
On Fri, 20 Jan 2006 12:55:10 GMT, "Brad P" <br******@hotma il.com>
wrote:

Well, Access security is better than that. But you'll have to
download, study, and fully understand MSFT's security FAQ before
proceeding.
Yet this Access security can be cracked. If you really need strong
security, Access is not the best platform. But then you already knew
that, because you did your research *before* you started.

-Tom.

I have a 2K database with a front end linked to a back end. I need to lockdown or secure both ends so a user can not access the raw data in tables
etc. I also need usernames and passwords for 50+ users. I've experimented
with securing the database but can't get it the way I want it. I can stilluse the shift key to obtain access. Anyone have a link to a site or
something to give me a guideline as to what I can do?

Thanks

Jan 20 '06 #4
Actually, to keep my users out of the back end, and front end code/forms
etc, you don't need any security..or even any code for that matter.

You most certainly can, and should hide all of the ms-access interface. The
options to complete hide and keep people out of the ms-access interface can
easily be done using the tools->start-up options. Using those options allows
you to complete hide the ms-access interface (tool bars, database window
etc). Also, using these options means you do not have to bother setting up
security. And, if you deploy a mde..then things are well locked up.

Try downloading and running the 3rd example at my following web site that
shows a hidden ms-access interface, and NO CODE is required to do
this....but just some settings in the start-up.

Check out:

http://www.members.shaw.ca/AlbertKal...s/DownLoad.htm

After you try the application, you can exit, and then re-load the
application, but hold down the shift key to by-pass the start-up options. If
want, you can even disable the shift key by pass. I have a sample mdb file
that will let you "set" the shift key bypass on any application you want.
You can get this at:

http://www.members.shaw.ca/AlbertKal.../msaccess.html

For the back end...I just put in a autoexec macro..and tha keeps them
out...I use:

So, I make a macro called AutoExec. In the macro, I put the following code:

Action Parms
Msgbox message:You do not have permissions to run this file
Beep: Yes
Type: Critical
Title: Can not run

Quit: Options:Exit

As an alterative, you an make a nice little form in the back end, and set
the startup options to run that form that displays a message, and then when
they click ok...you do a application.qui t. Eithway..this keep 99% of the
users out..as they think they don't have persmissions...
--
Albert D. Kallal (Access MVP)
Edmonton, Alberta Canada
pl************* ****@msn.com
http://www.members.shaw.ca/AlbertKallal
Jan 22 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
5292
by: Matt | last post by:
I always heard people saying IIS ASP front end, and MS-SQL back end. ASP is for server side programming and dynamic content generation, how could it is called front end? Because I thought it is executed in the server, which is back end? I think I am confused with the term front end and back end here. Please advise. Thanks!!
11
1906
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted while other read-only users may be browsing and generating reports. I am working with MS/ACCESS 2000 and would like to split the database into a front-end and back-end and then put the back-end onto a shared drive that all of my group has access...
4
2814
by: John Baker | last post by:
Hi: I have an application that has a back end and a front end. I need to add a table which is identical to one in the back end, and then use it for a temporary holing place form some records. I have done the following: .. Copied the table in the back end and given the copy a new name .. Created a table with the identical name to the back end copy in the front end .. Used the linkage process to link the table reference in the front end...
11
3444
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice that made sense. One comment I've seen alot about is "securing the hashing routine" but no-one explains how to accomplish this. So how do I secure my hashing routine? Do I use code access security, role based security, ACLs, etc or combination?...
4
2818
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a separate front-end and back-end, which is rather surprising considering that all Access databases should be split into a separate front-end and back-end. Noticing that there are quite a lot of questions on this subject in the Access newsgroups...
5
6265
by: The alMIGHTY N | last post by:
Hi all, Let's say I have a simple math formula: sum (x * y / 1000) / (sum z / 1000) I have to do this across 50 items, each with an x, y and z value, when the page first loads AND when a user modifies any of the x, y and z values.
10
409
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very clear and I actually understand it!
8
276
by: Albert D. Kallal | last post by:
You most certainly can, and should hide all of the ms-access interface. The options to complete hide and keep people out of the ms-access interface can easily be done using the tools->start-up options. Using those options allows you to complete hide the ms-access interface (tool bars, database window etc). Also, using these options means you do not have to bother setting up security. Try downloading and running the 3rd example at my...
14
9460
by: Brian Nelson | last post by:
Sorry for the long post, I've tried so hard to solve this one but I'm just stuck! We've had a multiuser .mdb file on a network share for years. I know it's not ideal, but it's worked well from Access 2000 to 2003. Ever since we upgraded to 2007, we've noticed some serious bloating. When we were on 2003, after a fresh compact, the database would be at about 20 MB. After normal use it would grow to about 25 MB and then significantly...
0
9856
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9698
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10598
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10657
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9436
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7836
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
7022
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5872
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
3136
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.