473,807 Members | 2,857 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Front End/Back End Security

73 New Member
I created an Access Database and added the Security thru the Securtiy wizard. Then Split the database into the fe and be files, however, the security did not stay with the .be file. Is there a way to prevent random people from accessing the .be file and/or tables? or by creating security on the .be, will it give me problems with running queries on the front end?

Can anyone help?

Thanks,

Matt
Apr 14 '08 #1
1 1428
Guus2005
3 New Member
Did you create a new workgroup first?
If not, you are editting the default system.mdw file. Then even i can enter your "secure" database when you use the default.

Create a new workgroup file.
Using this new workgroup file, open a new database
Import all objects from the old, unsecure FE database into this new database.
Do the same for your BE.

Add users and permissions. Now you are secure.

HTH:D
May 30 '08 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

12
9912
by: Corey Burnett | last post by:
I have a client that has a split database (front-end/back-end). They are also using Access security - MDW file. The front end MDE file, the back end MDB file, and the MDW file are all located on a shared folder on the file server. They have two populations of users - local and remote. *ALL* users currently get to the system via a Citrix login. They log in to Citrix and get a Citrix desktop. Then they start the application via a...
2
367
by: Freeserve | last post by:
Not sure whether this is the right group, but I can't find anything in the ..NET groups and my apologies if this has already been covered or is considered "off subject". I am looking at using an Access database to hold data which will be handled via VB.NET and I am not sure about some of the security aspects. I am going the .NET route as part of the application involves using a Pocket PC and I don't want part to involve deploying...
5
1547
by: RO|_F | last post by:
Hello, Does anybody know if there are programs which do the following: Act as 'front end' of a database (preferrably MS Access) Encrypts or converts the contents of the database so that data is only readable through the program? Thanks, Rolf
4
3632
by: Jay Mack | last post by:
Hello, I converted an Access application that used to have a MDE front-end (distributed to each user) with a MDB back-end on a share. It now has a MDE front-end with linked ODBC SQL Server 2000 tables as the back-end. Is it a bad practice to place the MDE front-end on a network share instead of sending a copy to each user? I want to do this as a form of cheap security, since the network share has access control on it. Previously, the...
4
3921
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+ users. I've experimented with securing the database but can't get it the way I want it. I can still use the shift key to obtain access. Anyone have a link to a site or something to give me a guideline as to what I can do? Thanks
3
2752
by: rdemyan via AccessMonster.com | last post by:
I'm thinking about providing a relatively easy method for users to restore the front end from a backup. The purpose is to allow for restoring if the front end becomes corrupt. Here are some particulars about my app 1) The front end is distributed as a .mde file. 2) Front end uses workgroup security 3) A separate logon form is used to actually launch the front end. 4) My app includes a backup front end form, that backups the front end...
4
2816
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a separate front-end and back-end, which is rather surprising considering that all Access databases should be split into a separate front-end and back-end. Noticing that there are quite a lot of questions on this subject in the Access newsgroups...
1
1066
by: abprules | last post by:
Help!!! This is driving me nuts! We have created a DB for a company. We split the DB. Everything seems to work well except for this one thing. Every time we refresh the front end of a user, the security file looses all security that was set. Each user has a desktop shortcut that they access their front end from. The front end points to the back end that resides on a computer. The security file is there as well.
3
1485
by: adjo | last post by:
I have used Access frontend with SqlServer backend combination for a number of years. In the easy 'oldfashioned' way using DAO and odbc linked tables. Works fine within limits. Now I'm facing the situation where there will be a 3 base tables that will be used constantly: - one of the tables will grow rapidly and can become hugh (think of 'hundredthousands'). - one of the tables is a sort of 'rights table' in wich a username determines...
0
9720
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9599
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10626
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10372
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9193
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7650
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5546
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4330
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
3011
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.