473,837 Members | 1,551 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Multi user enviroment - part II

I have a multi user database and users were created by user level security
wizzard - as I mentioned in message before. Everything works fine for those
users, but now I have another problem. I have another database with linked
tables from secured database.
How can I approach secured database from the unsecure one?

Thx
Dec 5 '07 #1
31 2808
"zdenko" <zs******@gmail .comwrote in message
news:fj******** *@ss408.t-com.hr...
>I have a multi user database and users were created by user level security
wizzard - as I mentioned in message before. Everything works fine for those
users, but now I have another problem. I have another database with linked
tables from secured database.
How can I approach secured database from the unsecure one?
You can't, otherwise security wouldn't be much use. You'd need to open your
*unsecured* database whilst joined to your custom workgroup so that the
linked tables would work.

Keith.
www.keithwilby.com

Dec 5 '07 #2
OK, but how can I join workgroup from unsecured database to secured?

You can't, otherwise security wouldn't be much use. You'd need to open
your *unsecured* database whilst joined to your custom workgroup so that
the linked tables would work.

Keith.
www.keithwilby.com

Dec 5 '07 #3
"zdenko" <zs******@gmail .comwrote in message
news:fj******** **@ss408.t-com.hr...
OK, but how can I join workgroup from unsecured database to secured?

Use a desktop shortcut to open your unsecured mdb using the "/wrkgrp"
switch:

"Full path to MSACCESS.EXE" "Full path to your unsecured database.mdb"
/wrkgrp "Full path to your workgroup file.mdw"

including quotation marks.

Keith.
www.keithwilby.com

Dec 6 '07 #4
Thanks for correct answer. It crosses my mind before and I've tried it but
shortcut was misspelled.
I have billing application whitch conists of two databases. Employers are
entering data in first and the other
database should be triggered once a day and make some file for delivering.
Idea is triggering by scheduler.
Now I have issue concerning security of "usecured" database because every
time it's triggered username / password dialog pops up.
Is there a way to avoid this pop up window?
"Keith Wilby" <he**@there.com wrote in message
news:47******** **@glkas0286.gr eenlnk.net...
"zdenko" <zs******@gmail .comwrote in message
news:fj******** **@ss408.t-com.hr...
>OK, but how can I join workgroup from unsecured database to secured?


Use a desktop shortcut to open your unsecured mdb using the "/wrkgrp"
switch:

"Full path to MSACCESS.EXE" "Full path to your unsecured database.mdb"
/wrkgrp "Full path to your workgroup file.mdw"

including quotation marks.

Keith.
www.keithwilby.com

Dec 6 '07 #5
Your problem is that you are trying to perform Enterprise operations
with a Micro database system (Access).

Access is quite remarkable for a Micro database system, but it is still
a Micro database system and does not have Enterprise capabilities. For
that you need to step up to an Enterprise system like MS Sql Server.

Rich

*** Sent via Developersdex http://www.developersdex.com ***
Dec 6 '07 #6

"zdenko" <zs******@gmail .comschreef in bericht news:fj******** **@ss408.t-com.hr...
Thanks for correct answer. It crosses my mind before and I've tried it but
shortcut was misspelled.
I have billing application whitch conists of two databases. Employers are
entering data in first and the other
database should be triggered once a day and make some file for delivering.
Idea is triggering by scheduler.
Now I have issue concerning security of "usecured" database because every
time it's triggered username / password dialog pops up.
Is there a way to avoid this pop up window?
If I understand you correctly you want to open the database scheduled, but you need passwords and a login ??
You can avoid the pop-up by providing the password and user with switches in your shortcut like /user "Username" /pwd "Password"

BUT of course security might be ALL gone now .... (everyone can read the shortcut)
BUT maybe this helps ...

Arno R
Dec 6 '07 #7
I will try your suggestion tomorow. Second database has linked tables to
secure one and
this database/application is on secured computer. All I need is starting
application/database when
computer is locked.

Dec 6 '07 #8
Just tried and it works! That's all I want this application to do. Thank's
very much!
Dec 6 '07 #9
Rich P wrote:
Your problem is that you are trying to perform Enterprise operations
with a Micro database system (Access).

Access is quite remarkable for a Micro database system, but it is still
a Micro database system and does not have Enterprise capabilities. For
that you need to step up to an Enterprise system like MS Sql Server.

Rich

*** Sent via Developersdex http://www.developersdex.com ***
Absolutely agreed. It's amazing how much time we as developers have to
spend trying to get Access, which was originally designed as a desktop
database, to behave as though it were a large scale Enterprise-level db
system like SQL Server or Oracle.

It's just that it's so much cheaper and simpler. And that's not even the
worst part. It's that it makes it so easy for users who don't really
know what they're doing to create really badly designed databases and
applications. Then, a year and a half later, after it's completely
broken down, is when they call us and ask us to fix "just this one
thing", and it turns out that the only way to do that is to completely
re-design the entire thing from the ground up.

Which, of course, requires the users to sit down and actually think
things all the way through, which is something they really don't like to do.

But, of course, if they'd been spending big bucks and deploying SQL
Server or Oracle, they would have *had* to do that.

Access...MS's little gift to us all!
Dec 9 '07 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
2745
by: bher2 | last post by:
good day... im working right now on a project given to me on a short time. i had a slight problem though, but it seems that most of it comes on my database. since theres not enought budget on having a good database like sql server, i just stayed on the access. my problem is, i can run my applications on multi-user enviroment using sql server but not on the access. running my applications simultaneously on a multi-user enviroment using...
6
3785
by: Andrew V. Romero | last post by:
First off, I am mostly familier with PHP but am trying to make a multi-step javascript program. For an example, I would like to run different sections of the script depending on how many times the user presses the submit button: <form method="post" name="step1" action="test.html"> <script language="JavaScript"> var position
1
3285
by: VMI | last post by:
In my Windows app, if I'm in a multi-line textbox and I'm writing a postal address (ie. write ist line and press <Enter>, write 2nd line and press <Enter>, etc...) how can I make sure that the Enter key will ALWAYS make the cursor jump to the following line in the textbox? For some reason, and this happens everywhere except on my development PC, if a user's writing a line and presses the <Enter> key, the program interprets that as the user...
2
1257
by: Mako | last post by:
Hi, I am looking for some advice on how to split up (multi-part) web forms. The first part of the form would be consistent for all users but depending on what selection they choose from a dropdown (around 6 selections or so) will determine what the next part of the form will be. I was thinking about using panels and the visibility property to show or hide different sections but this seems like a sloppy solution to me. Any other...
1
2515
by: maciek | last post by:
Hi, I was wondering if anyone could suggest me a book/article/tutorial on Exception Handling in multi tier Windows Apps. What are the best practices/ways to implement EH in multi tier enviroment. I read some MS Best Practices articles on MSDN. It helped a little, but considering how unexperienced programmer I am, I think I'd need a good sample code and explanation I could follow to fully understand the issue. Thanks in advance.
1
9327
by: mknoll217 | last post by:
I am recieving this error from my code: The multi-part identifier "PAR.UniqueID" could not be bound. The multi-part identifier "Salary.UniqueID" could not be bound. The multi-part identifier "PAR.UniqueID" could not be bound. The multi-part identifier "PAR.PAR_Status" could not be bound. The multi-part identifier "Salary.New_Salary" could not be bound. The multi-part identifier "Salary.UniqueID" could not be bound. The multi-part...
2
1477
by: zdenko | last post by:
Hi, I have database with four users. Users were created by user-level security wizzard. How can I (as admin) know who is using the database and somehow log this sessions? Thx
0
1296
by: mirandacascade | last post by:
Apologies in advance for what I'm guessing may be a trivial question. Assume the following: 1) multi-user environment 2) standard (i.e. not a class module) module with: Public strSample as String 3) first user user opens app at 9:00 and runs code that results in setting the variable strSample to "abc"
0
1226
by: TLarge | last post by:
I wish to install an access 2003 in a multi user enviroment. My client does not wish to install Access on his machines as he is running open office. I am familiar with spliting data bases and also linking to SQL server. My question is can I create a runtime version of a front end that is linked to tables on a server? Trevor
0
10883
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10578
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10631
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10276
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9409
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7813
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5670
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4477
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
4049
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.