473,853 Members | 1,984 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

MS Access Security Troubleshooting Guide

Existing Access Database Troubleshooting

I am new to access database and inherited an access application and
all users who were previously able to use this access file
simulataneously are now locked out exclusively . Some have not been
able to get on at all. Obviously, this is the problem, and as far as I
know, no changes have been made to access backend or front end. I have
no historical data as to whether or not the access db was secured
previously,..)

This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network. How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.

If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)

I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file. However, I
do not know what to anticipate breaking if I recreated one, ... and
just wanted to see if any thoughts could be shared on this.

Any guidance as to how to troubleshoot an application on a network
share would be appreciated.

Nov 1 '07 #1
2 2495
siewong wrote:
Existing Access Database Troubleshooting

I am new to access database and inherited an access application and
all users who were previously able to use this access file
simulataneously are now locked out exclusively. Some have not been
able to get on at all. Obviously, this is the problem, and as far as I
know, no changes have been made to access backend or front end. I have
no historical data as to whether or not the access db was secured
previously,..)
Could you describe the situation a bit more? What do you mean, locked
out exclusively? Is there an error message displayed? What is the
error number or description?

It sounds like some can get in and others can't. What's the difference
between the two? Have you looked at the desktop icon on the machines
that work and those that don't?

>
This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network. How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.

If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)

I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file. However, I
do not know what to anticipate breaking if I recreated one, ... and
just wanted to see if any thoughts could be shared on this.

Any guidance as to how to troubleshoot an application on a network
share would be appreciated.
Nov 2 '07 #2
"siewong" <wo*****@gmail. comwrote in message
news:11******** *************@5 7g2000hsv.googl egroups.com...
Existing Access Database Troubleshooting

This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network.
If you can open the file directly from an explorer window then either:

the file has not been secured correctly

or

you are joined to the custom workgroup.

The latter is not recommended, rather you (and your users) should switch to
custom workgroups on a session-by-session basis.
How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
If users are joined to the default "system.mdw " workgroup then the would
need a shortcut with a valid "/wrkgrp" switch to gain access to the file.
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.
No, you won't find it there. The developer should have this information,
not much help to you I know.
>
If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)
Access will only "reference" the workgroup file you tell it to. By default
this is "system.mdw ". You join other workgroups either using the workgroup
admin menu option or by using a shortcut.
>
I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file.
You can only recreate a workgroup file if you have *exactly* the same
information that was used to create the original. It wouldn't be much in
the way of security if you could easily recreate workgroup files with
minimal information.

There's a security example on my website that might help you understand the
concept (in addition to the FAQ).

HTH - Keith.
www.keithwilby.com

Nov 2 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
3891
by: John | last post by:
Hi We have an access app (front-end+backend) running on the company network. I am trying to setup replication for laptop users who go into field and need the data synched between their laptops and the server upon return to the office. I am planning it this; Move all access tables to sql server and then link the tables to access front-end mdb app (using odbc?). Copy the same setup (access front end + sql backend) onto each laptop....
4
2546
by: RM | last post by:
Had VS .Net 2002 installed on W2k Server SP3 and supported a number of web sites. Installed VS .Net 2003 on Friday and now all web sites using .Net & MS ACCESS get this strange error upon open. ASP=/TestDotNet/AdoNet.aspx System.Data.OleDb.OleDbException: Unspecified error at System.Data.OleDb.OleDbConnection.ProcessResults(Int32 hr) at System.Data.OleDb.OleDbConnection.InitializeProvider() at System.Data.OleDb.OleDbConnection.Open()...
9
2089
by: Stan | last post by:
Here is my scenario: Web server ------------ Framework 1.1 Application proxy for the serviced component Component server ------------------- Framework 1.0
5
2068
by: Norsoft | last post by:
I have a .Net 1.1 application which is downloaded into an aspx page. It is a dll which inherits from System.Windows.Forms.UserControl. It works fine on a PC with only the 1.1 Framework. However, the control will not load on a PC with the 2.0 Framework installed. I know that IE will use the newest framework so I assume it is a security issue. At the assembly level I apply the following attributes;
5
13317
by: Mitchell S. Honnert | last post by:
Is there a way, given the full path of a folder on a network, that one can programatically tell if you have Read access to that folder? I have an application where the user is able to select a number of search folders using the standard dialog control. There shouldn't be an issue with the search folder being on a local drive or a network drive. But if you don't have Read access to the folder, there's trouble. The user can see the...
7
12118
by: Peter Ritchie | last post by:
I'm writing a Web Service and I would like to add performance counter data for monitoring performance of the Web Service's operations over time and load. The problem is, I get the "Requested registry access is not allowed." SecurityException when I try and create the performance counter category via PerformanceCounterCategory.Create(). I understand the login used to run the Web Service does not have access to the registry keys...
7
1989
by: Visitor No 3 | last post by:
My local Crinkles group(U3A), of which I am one, want me to develop a noddy database and web site for their members. Some are computer literate, others not so. I thought an Access 2000 .mdb on a server from the local council with a web page in Active Server Pages(ASP) and using ADO would do the trick, then one of them could update it at home on the web to keep track of members and somebody else could do the same for current programmes etc....
12
1963
by: Dr. Edmund M. Hayes | last post by:
I wrote a access program that works well enough that a handful of people would like to buy it from me. My problem is that if I sell it to someone there is no mechanism that I know of to protect them from giving it to anyone they feel like. The program produces reports that are specific to a particular organization but that does stop anyone from just modifying that report to make it specific to another organization, who they might have...
8
13347
by: =?Utf-8?B?TWFuanJlZSBHYXJn?= | last post by:
Hi, I created a web service and hosted it in Windows Services. It is working fine. Now I am trying to implement the X509 certificates for message layer security. But it is throwing the following exception: An unhandled exception of type 'System.ServiceModel.Security.SecurityNegotiationException' occurred in mscorlib.dll
0
9898
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9748
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
11020
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10670
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10735
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
1
7907
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5736
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
2
4143
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
3180
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.