473,657 Members | 2,693 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to limit users to manipulating data only through forms.

16 New Member
Hi all,

I am really new to the use of Access, or rather, the work dealing with codes and applications. Now I am working with this huge Access 2003 database. How can I possibly create some interface or other means to limit other users to modifying data only through forms. Is there any resource of relevant algorithm or codes that I can look up to? Thank you all...

xiaowei
Jun 6 '07 #1
9 7850
maxamis4
295 Recognized Expert Contributor
Well there are many ways to limit users. I could give you several links and references to what you need to learn. But I need more information to guide you in the right direction.

You could split the database, tables in one database and forms in another (best practice)

you could create security using access secuirty

you could use active directory

and there are a couple more. What exactly do you want to d?

let me know
Jun 6 '07 #2
jamjar
50 New Member
I'm interested in seeing the advice you receive ....

I think it could be done with a Access security on a front-end/back-end set up, and all users prevented from writing to the back end tables (if not, they could always link in from another database), in which case you would set up front end forms based on "Run With Owner's Permission" queries to enable updating and entry of data.

How much of this is familiar to you?

James
Jun 6 '07 #3
xiaowei
16 New Member
Thank you both.
Basically what I m doing now is like a survey or evaluation form. So the forms are the questionaire and other related info, and the tables stores all the data or rather answers to the questions. What I intend to do is to split the database into two so that people doing the survey only get the forms, not seeing the data. I feel that is the sensible way right? I did try the split function in Access, but to my understanding, users are only refrained from changing the design of the tables, and they can still read the tables and modify the values. Am I correct in saying that? As in doing it via security set-ups, I find there are quite a number of security levels, which really confuses me. I just have some preoccupation that designing of application should always observe the rule of information hiding or something. May not be relevant here. I would really appreciate your suggestions in designing this thing.
Thank you again.

xiaowei
Jun 6 '07 #4
jamjar
50 New Member
Thank you both.
What I intend to do is to split the database into two so that people doing the survey only get the forms, not seeing the data. I feel that is the sensible way right?
Yes
I did try the split function in Access, but to my understanding, users are only refrained from changing the design of the tables,
Yes and no. They can't change the design from within the front-end database you give to them, but if you don't use security, and they don't follow the rules, they can open the back-end and do whatever they want.
and they can still read the tables and modify the values. Am I correct in saying that?
Yes, if you don't use security.

Without Access user security, any user can either open the back-end directly or create a link from any other database they may create.
With Access user security, you can prevent them changing the design of your tables fairly easily, but under normal setup, they would have read-write (append/update/delete) privileges to any table you wish them to update using forms, so they would still be able to open the tables in the back-end, or link to them, and update directly.
To prevent this you would have to deny them append/update/delete privileges as well, but then forms linked to those tables either directly or through normal queries (run with User's permissions) won't allow them to enter or modify data. You need to base all the forms on queries, and change the Query Properties Run Permissions to "Owner's", where the owner has the appropriate table level append/update/delete privileges .
To master the security setup, download and review the Access Security FAQ. Try to implement it - you will probably need to set up new databases after creating a workgroup and logging in as the user you wish to have full privileges, then import the tables/forms etc from the old.
Good luck!

James

PS- Beware: even once you have done this, the workgroup file is vulnerable to being hacked. MS Access security is not industrial strength!
Jun 6 '07 #5
xiaowei
16 New Member
Yes Yes and no. They can't change the design from within the front-end database you give to them, but if you don't use security, and they don't follow the rules, they can open the back-end and do whatever they want.Yes, if you don't use security.

Without Access user security, any user can either open the back-end directly or create a link from any other database they may create.
With Access user security, you can prevent them changing the design of your tables fairly easily, but under normal setup, they would have read-write (append/update/delete) privileges to any table you wish them to update using forms, so they would still be able to open the tables in the back-end, or link to them, and update directly.
To prevent this you would have to deny them append/update/delete privileges as well, but then forms linked to those tables either directly or through normal queries (run with User's permissions) won't allow them to enter or modify data. You need to base all the forms on queries, and change the Query Properties Run Permissions to "Owner's", where the owner has the appropriate table level append/update/delete privileges .
To master the security setup, download and review the Access Security FAQ. Try to implement it - you will probably need to set up new databases after creating a workgroup and logging in as the user you wish to have full privileges, then import the tables/forms etc from the old.
Good luck!

James

PS- Beware: even once you have done this, the workgroup file is vulnerable to being hacked. MS Access security is not industrial strength!
Thank you, James, for this very clear and comprehensive answer.
However it appears to me that it would not be so ideal to realize my objectives by using Access, right? It would be rather easier, I guess, if I just give out the excel files and import them back to Access. It is feasible right? I shall re-consider all over... Thank you a lot for your help. Hope you will see this.

xiaowei
Jun 6 '07 #6
cyberdwarf
218 Recognized Expert New Member
Hi

You could produce input forms with any development tool which can read Access data (using ODBC, or direct drivers). This way, you would not have to worry about any Access security failings.

Just a thought

Steve
Jun 6 '07 #7
maxamis4
295 Recognized Expert Contributor
It would not be advised to start importing from excel. You can do wonders importing, but for the project you have that complex function is not neccsary. Importing only creates more questions about your process. If this is the road you need to pursue we will help you. But for now I would advise against it.

Very simply put most users don't know enough about access to be dangerous with it. So as long as you split the data from the forms, for the most part I think you will be good to go. make sure that when you split the two you put them in different locations as well. its a good practice. Do what we said and link your tables to the backend. This process is relatively simple as long as the backend stays put. Then design your front end. When your done with the front end create an mde which is shown on the link below. The mde is one of access's better accomplishments for security. This should help you get started.



http://www.dummies.com/WileyCDA/DummiesArticle/id-2127.html
Jun 6 '07 #8
xiaowei
16 New Member
Thank you experts...
I would try and probably come back for more advice from you

Xiaowei
Jun 7 '07 #9
jamjar
50 New Member
Xiaowei, I thought some more about your problem last night and I think that as maxamis4 suggests, if your users are not sophisticated or can be trusted not to play around on their own (ie, you just don't want them seeing the tables and accidentally opening and editing them), to keep your users away from the tables, you can simply change the Startup options (Tools|Startup) :

Create a form you wish to present to all users at startup (use the Access Switchboard wizard if you wish) and set this as the Display Form/Page. Uncheck the Display Database Window option. These steps will keep your users from seeing the tables/queries etc. and put them into the forms immediately. They will still be able to Unhide the database and access tables directly, but will have to go out of their way to do so.

Separate front-end / back-end is still a good idea (and making an mde as maxamis4 suggests is a good idea too).

If you wish, you can lock it down further by unchecking the Allow Full Menus and Use Special Access Keys (F11 will unhide the database window) options. Now the only way the user can make the tables visible is to hold the shift key down while opening the database. (I'm not sure if the Shift key trick works once you have converted to and mde. And bear in mind if you convert to an mde you will want to keep a copy in mdb format to work on.)

I don't know anything about using other forms via ODBC or Data Access Pages. If they can be used to allow data entry without direct write permissions on the back-end, or to otherwise enhance security, I'd love someone to point me in the direction of a good tutorial!

cheers-
James
Jun 7 '07 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

0
2557
by: mrwoopey | last post by:
Hi, My OLAP data cube is giving me the following error when I am manipulating OLAP data cube views: "the data being processed is over the allowed limit" I know that this message is caused by the size limit of each form field that is retrieved in the Request object is 102,399 bytes. The error occurs when I exceed this limit.
2
12965
by: Andy Fish | last post by:
Hi, I am in the process of designing a UI which has to be fairly sophisticated. There will be a number of list boxes and other controls, with pop-up windows to edit certain properties. It's the kind of thing I would normally have done in VB but I want it to be browser-based. I've only used javascript for trivial things before so this would be my first serious javascript development. I would like it to run on all reasonably recent...
3
4440
by: mgPA | last post by:
Short: How can I limit the number of concurrent logins to Access (2000) DB? Long: I seem to be having the problem discussed in previous postings of having more than 9 or 10 concurrent logins. If I can limit the number of concurrent logins to 8 or 9, that would satisfy our needs. Thanks
4
11959
by: Zenon | last post by:
I have a C# application which interacts with an HP UNIX box via PSFTP. I have run in to a problem where the maximum amount of characters I can redirect is 1024. This number leads me to believe that it is not random and perhaps there is some flushing that needs to occur before I can read more. I couldn't find anything about the 1024 char limit anywhere. Is anyone familiar with such a thing, or am I just doing something wrong in my code? ...
16
4397
by: google | last post by:
Hello, I am working on an Acc2003 app for my company. In the interest of reducing chances of corruption due to unstable network connectivity, I would like to either prevent users from running it through a wireless connection, or limit their use to read-only. I have absolutely no idea if this is possible, and if so, how. Is there any way from within Access to get the list of routers they are connecting through? Ideally, I'd like to keep...
1
6666
by: Jan | last post by:
Is there a 2GB size limit on Access2003/XP ? If so, is there an easy way to span across more than one MDB file?
11
9685
by: Israel | last post by:
I've trying to write a query that seems like it should be simple but for some reason my attempts are not working. This is really a general SQL quesion and doesn't pertain to MySQL but I couldn't find a generic database discussion group except on on advancement and theory and this is really a basic query construction question. Just say I have a table with three columns, name, date, score and these represent the test scores for various...
3
4028
by: =?Utf-8?B?QmlsbHkgWmhhbmc=?= | last post by:
I want to limit the user only login the system one time at the same time. I don't want him login the system two with the same user at the same time. How to do this? If i have a table to record if this user has logined, this user didn't logout and just close IE, how do i set his recoed in the table logout? Thanks, -Billy
17
2469
beacon
by: beacon | last post by:
Hi everybody, I'm working with data to determine if records were completed in a given timeframe. I'm trying to figure out how I can assess records with the same ID, but have different data in other fields to, to come up with compliance for that ID. Here's the gist...the database tracks info for patients at a hospital. Upon discharge, the charts for the patients get assessed to make sure that each of the forms in the chart are...
0
8316
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
8833
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8509
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8610
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7345
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6174
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
1
2735
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1967
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1730
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.