473,785 Members | 2,249 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing an Access Database.

D
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?

May 7 '07 #1
2 1847
D wrote:
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?
No. If they can you missed a step.

--
Rick Brandt, Microsoft Access MVP
Email (as appropriate) to...
RBrandt at Hunter dot com
May 7 '07 #2
Hi, David.
If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?
In many cases, yes, but only if certain vital steps were missed. To give
you an idea of which steps were missed, even after taking those steps you
described, the database will not be secured under any of the following
circumstances:

1.) The workgroup information file used to secure the database is the
default workgroup information file.

2.) The owner of the database is the default Admin user, even if the owner
is later changed to another user.

3.) The owner of all the objects is originally the default Admin user, even
if ownership is later transferred to another user.

4.) The Access 2000 Security Wizard is used to secure the database.

5.) The Users group has permissions to open and run the database.

6.) Any member of the Admins group doesn't have a password set, or the
password is easily guessed.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.
"D" <da***********@ virgin.netwrote in message
news:g6******** *************** *********@4ax.c om...
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?

May 7 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
1608
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it with every function call from my windows client. Any alternatives?
11
1902
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted while other read-only users may be browsing and generating reports. I am working with MS/ACCESS 2000 and would like to split the database into a front-end and back-end and then put the back-end onto a shared drive that all of my group has access...
4
1403
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my question: How have developers successfully prevented access to their data tables and protected their database design? Looking forward to some suggestions. Tony
7
2216
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store MS Word docs in a folder on a network server. The database admin will save the docs to the folder. The docs must be available to Word automation out of a specific Access database and available to the database admin out of MS Word. Only users of...
9
1788
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1. IPGAdmin is now a member of the ‘Admins’ group and owns the database and imported objects. 2. Admin the old user does not own the objects or the database and does not have any permissions.
4
3915
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+ users. I've experimented with securing the database but can't get it the way I want it. I can still use the shift key to obtain access. Anyone have a link to a site or something to give me a guideline as to what I can do? Thanks
4
2814
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a separate front-end and back-end, which is rather surprising considering that all Access databases should be split into a separate front-end and back-end. Noticing that there are quite a lot of questions on this subject in the Access newsgroups...
4
1718
omerbutt
by: omerbutt | last post by:
hi every one I am A new Bee to php mysql and i was surfing through the net to learn about how to secure the mysql when you are working in a web environment while working with php html and javascript i came through this article http://articles.techrepublic.com.com/5100-6350_11-5287638.html and before i proceede i must tell you that iam using win xp professional sp2 where were given two main and very first step before you start making your...
10
3373
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1. Data encrypted by AES key 2. AES key encrypted with Asymmetric public key (?)
0
9646
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
1
10097
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9957
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8983
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7505
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6742
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5386
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5518
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4055
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.