473,387 Members | 1,619 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Security question - is this possible

I hope I can explain this clearly.

I have this database that calculates Bids for construction jobs. You log
in, (login id and password) select a project, go into that project and
create a "bid" where they can add items that will be needed for construction
(2x4, 4x4, nails, etc). They have the ability to create multiple versions
of the bid on each project.

At this point everyone has access to every project, as this is necessary.
General users have read/write access to add/edit/remove bids and items from
bids, they do not have the ability to change the project list or the list of
items to choose from. Admins have the ability to do everything (including
add/remove projects and Items from the master list). Finally, there is
"read only" for those who only need to print the bids.

But what they've asked is, can I set up security somehow so that if User Joe
creates Bid on XYZ project and creates versions and adds items that ONLY
User Joe can go in and delete items or Versions that he created. Likewise
UserJane can only view Joe's versions but cannot delete them. BUT, User
Joe's Secretary may be tasked with doing the data entry for the items, so
she will log in as herself but access the project and add

Currently there are 20,000 available projects and there isn't anything
stating which user controls which project. All users may potentially work
on a project.

There are also over 2000 items to choose from when creating a bid.

Secretaries could have access to add/remove items from a bid, but not have
access to add/remove bids.
Contractors could have access to add/remove items from their bid, but not
someone elses. Likewise for version of a bid or bids themself.

Is this something that is possible to do and where might I begin to look to
learn how to do something like this?


Nov 12 '05 #1
1 1920
It's possible, but sounds like it might be a bit of an undertaking. I assume
you are using the Access User Level security model. If so, you could add a
field to the necessary tables and store the user name of the CurrentUser.
Then you would need to put code behind your data entry forms to give the
various groups you set up different kinds of access. The code you need is in
the Security FAQ. There is a link to it on the Security page of my website.

--
Lynn Trapp
MS Access MVP
www.ltcomputerdesigns.com
Access Security: www.ltcomputerdesigns.com/Security.htm

"JayJay" <jj****@notmail.com> wrote in message
news:bj************@ID-87431.news.uni-berlin.de...
I hope I can explain this clearly.

I have this database that calculates Bids for construction jobs. You log
in, (login id and password) select a project, go into that project and
create a "bid" where they can add items that will be needed for construction (2x4, 4x4, nails, etc). They have the ability to create multiple versions of the bid on each project.

At this point everyone has access to every project, as this is necessary.
General users have read/write access to add/edit/remove bids and items from bids, they do not have the ability to change the project list or the list of items to choose from. Admins have the ability to do everything (including add/remove projects and Items from the master list). Finally, there is
"read only" for those who only need to print the bids.

But what they've asked is, can I set up security somehow so that if User Joe creates Bid on XYZ project and creates versions and adds items that ONLY
User Joe can go in and delete items or Versions that he created. Likewise UserJane can only view Joe's versions but cannot delete them. BUT, User
Joe's Secretary may be tasked with doing the data entry for the items, so
she will log in as herself but access the project and add

Currently there are 20,000 available projects and there isn't anything
stating which user controls which project. All users may potentially work
on a project.

There are also over 2000 items to choose from when creating a bid.

Secretaries could have access to add/remove items from a bid, but not have
access to add/remove bids.
Contractors could have access to add/remove items from their bid, but not
someone elses. Likewise for version of a bid or bids themself.

Is this something that is possible to do and where might I begin to look to learn how to do something like this?

Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Olaf Baeyens | last post by:
Can someone out there point me to a URL or other reference how to use these security stuff in .NET? I know everything can be found online on the msdn but since I am new to this security stuff, I...
3
by: craig | last post by:
I am working on my first .NET development project that involves custom role-based security per the project requirements. This lead to a general design issue this week that really caused us some...
29
by: rjames.clarke | last post by:
I am developing an online application and the last thing I need to get a handle on is security. This app is very heavy with forms. Business critical data will be entered via forms and inserted in...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
1
by: Mark | last post by:
All, I know this topic has been covered many times, but this particlar question is of a subject which I am just learning (VB). Once I have established what is possible, the individual will be...
1
by: cs5b | last post by:
I am looking for the official javascript security specification for web browsers. EMCAScript and DOM spec does not seem to contain a section on security, so I assume none exists and the security...
1
by: nancy | last post by:
I am new to PHP but have done other programming can someone please hold my hand and slowly talk me through some simple security issues? I have seen in PHP documents that there are 'strip...
1
by: smjawad | last post by:
Hi, I am developing a system on which multiple front-end kiosks machines will be connected to a central server. I am being asked for the authentication mechanism for the machines, like how will...
18
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.