473,789 Members | 2,441 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Each Access security group can have only one password?

When using Access security can each group have only one password?
So all members of the group have the same and/or one password?
Then in order to have each member of a group have their own password
then you would need a group for each member?

Feb 13 '07 #1
3 1847
<to*******@msn. comwrote in message
news:11******** **************@ a75g2000cwd.goo glegroups.com.. .
When using Access security can each group have only one password?
So all members of the group have the same and/or one password?
Then in order to have each member of a group have their own password
then you would need a group for each member?
I was not aware that a group has a password at all.....
So all members of the group have the same and/or one password?
No, each user that logs on has their own password. You then assign the
groups to the user.

So, users become members of groups....or, a better ways is to say that YOU
assign
each me (user) to a particular group.

There is no passwords involved in assigning those groups to each member.
(you have to have admim privileges to make those assignments).

So, you might assign some users to be a member of the SalesReprot group, and
they would be the only ones
that could view reports that are a member of that SalesReprot group.

If you always assigning users to member groups, then you NEVER actually put
the users names into the actual mdb.
Thus, you can freely deploy new updates to your clients, and their existing
security settings will NOT be lost
when you deploy that new front end to them. However, the instant you start
assigning actual users to actual forms,
or report (or any object), then when you deploy a new update, then those
setting the customer made will be lost
(assuming you are developing in a different location, or "off site" from
where the software is being used - this
also assume they are not making new "groups"). You should as a general rule
site down and make the groups
so that during development..as you add a new report, or whatever..you assign
it to the particular group of your
choice. Then as you add new users, you assign what user groups they belong
to (sales group, accounting group
....whatever you like). Take a look at the following screen shots to see what
I mean by sitting down and making some user
groups.

http://www.members.shaw.ca/AlbertKal...erFriendly.htm

--
Albert D. Kallal (Access MVP)
Edmonton, Alberta Canada
pl************* ****@msn.com
Feb 13 '07 #2
Hello,

I have been asked to make modifications in a database but I am not
very familiar with Access. This database is accessed over the network,
by many concurrent users. Working directly in the production database,
apart from being bad practice in general I suppose:), is therefore not
an option. But taking it down isn't either. What I am looking for is
some pointers to sites/books that can supply me with guidelines on how
to best go about.

tia,
arno
Feb 13 '07 #3
sorry sorry, wrong shortcut key, was meant to be new thread - arno
Feb 13 '07 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
4242
by: Barb | last post by:
Hi there, I sincerely hope that someone out there can help. I have two instances of the SQL 2000 Desktop Engine running. One is on my local machine for development and the other is on another machine on our network which is the production environment. I have built an Access 2003 front end application which connects to this database. This works fine locally, as you would expect. I successfully installed the database on the...
7
1962
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the information for one area. Since the users do not know Access, I created a form to make it easy to generate a report. Is it possible, either when the database is initially opened or when the user clicks on the command button to execute the report, to...
3
2147
by: Mike Marriott | last post by:
Hello all, Newbie Here (please go easy, you cant make me fell more stupid than I allready do) I have a small, but complex data base, in Access 2000, that I am creating, I have allready starting to add data to it. Alot of data (around 30 hours work, creating and entering data). I did a stupid thing, I protected the thing. . . . Using the Security
3
1976
by: patcho | last post by:
Hello, I have a problem that I was hoping to get some assistance with. I have built a split database (back end with all the tables and a password to protect the information & a front end to link to it). I have followed the Access Security model to create security over my Front End database (create a new workgroup, remove the admin user from the admins group, change permissions on the users group to very limited access etc).
8
3137
by: carriolan | last post by:
Hi I have an MS Access based application almost ready for distribution to the public and I find that even though I have compiled it into an MDE file, tables and queries can still be be imported if accessed by another MS Access database. How can I stop this please? Regards Carriolan
9
1524
by: Lars Netzel | last post by:
Hi, I have built an application that is driven by an access database. This is then deplaoy onto about 80 clients through an installation package that also proved a local copy of an emtyp database to start working with. This have worked flawless. Now I have added som information in this database that needs password protection. I have set a password in access but now I cannot connect to it. I get an error saying somethign about a...
12
1956
by: Dr. Edmund M. Hayes | last post by:
I wrote a access program that works well enough that a handful of people would like to buy it from me. My problem is that if I sell it to someone there is no mechanism that I know of to protect them from giving it to anyone they feel like. The program produces reports that are specific to a particular organization but that does stop anyone from just modifying that report to make it specific to another organization, who they might have...
4
8565
by: mrouleau | last post by:
I am sorry if this is the wrong group to ask, if so please point me in the correct direction. My problem is I have an MDB file with user-level security on it (mdw). When i move it over to a system that has Access 2007 and try to open it, I get a user name and password prompt. The admin username and password from the other system doesn't work. Is there anything special I need to do? If I could I would actually love to remove this...
3
2490
by: Charlotte | last post by:
Hello, info: I'me a rookie with IIS I have on a WinXP Pro the IIS installed, so I can test some pages before uploading to the hostserver online on the hostserver is a possibility (with the program PLESK) to make a directory secure (to access a page in that directory, you have to give a username and a
0
9663
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10195
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9979
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7525
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6765
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5415
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4090
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3695
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2906
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.