I hope I can explain this clearly.
I have this database that calculates Bids for construction jobs. You log
in, (login id and password) select a project, go into that project and
create a "bid" where they can add items that will be needed for construction
(2x4, 4x4, nails, etc). They have the ability to create multiple versions
of the bid on each project.
At this point everyone has access to every project, as this is necessary.
General users have read/write access to add/edit/remove bids and items from
bids, they do not have the ability to change the project list or the list of
items to choose from. Admins have the ability to do everything (including
add/remove projects and Items from the master list). Finally, there is
"read only" for those who only need to print the bids.
But what they've asked is, can I set up security somehow so that if User Joe
creates Bid on XYZ project and creates versions and adds items that ONLY
User Joe can go in and delete items or Versions that he created. Likewise
UserJane can only view Joe's versions but cannot delete them. BUT, User
Joe's Secretary may be tasked with doing the data entry for the items, so
she will log in as herself but access the project and add
Currently there are 20,000 available projects and there isn't anything
stating which user controls which project. All users may potentially work
on a project.
There are also over 2000 items to choose from when creating a bid.
Secretaries could have access to add/remove items from a bid, but not have
access to add/remove bids.
Contractors could have access to add/remove items from their bid, but not
someone elses. Likewise for version of a bid or bids themself.
Is this something that is possible to do and where might I begin to look to
learn how to do something like this? 1 1920
It's possible, but sounds like it might be a bit of an undertaking. I assume
you are using the Access User Level security model. If so, you could add a
field to the necessary tables and store the user name of the CurrentUser.
Then you would need to put code behind your data entry forms to give the
various groups you set up different kinds of access. The code you need is in
the Security FAQ. There is a link to it on the Security page of my website.
--
Lynn Trapp
MS Access MVP www.ltcomputerdesigns.com
Access Security: www.ltcomputerdesigns.com/Security.htm
"JayJay" <jj****@notmail.com> wrote in message
news:bj************@ID-87431.news.uni-berlin.de... I hope I can explain this clearly.
I have this database that calculates Bids for construction jobs. You log in, (login id and password) select a project, go into that project and create a "bid" where they can add items that will be needed for
construction (2x4, 4x4, nails, etc). They have the ability to create multiple
versions of the bid on each project.
At this point everyone has access to every project, as this is necessary. General users have read/write access to add/edit/remove bids and items
from bids, they do not have the ability to change the project list or the list
of items to choose from. Admins have the ability to do everything
(including add/remove projects and Items from the master list). Finally, there is "read only" for those who only need to print the bids.
But what they've asked is, can I set up security somehow so that if User
Joe creates Bid on XYZ project and creates versions and adds items that ONLY User Joe can go in and delete items or Versions that he created.
Likewise UserJane can only view Joe's versions but cannot delete them. BUT, User Joe's Secretary may be tasked with doing the data entry for the items, so she will log in as herself but access the project and add
Currently there are 20,000 available projects and there isn't anything stating which user controls which project. All users may potentially work on a project.
There are also over 2000 items to choose from when creating a bid.
Secretaries could have access to add/remove items from a bid, but not have access to add/remove bids. Contractors could have access to add/remove items from their bid, but not someone elses. Likewise for version of a bid or bids themself.
Is this something that is possible to do and where might I begin to look
to learn how to do something like this? This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: Olaf Baeyens |
last post by:
Can someone out there point me to a URL or other reference how to use these
security stuff in .NET?
I know everything can be found online on the msdn but since I am new to this
security stuff, I...
|
by: craig |
last post by:
I am working on my first .NET development project that involves custom
role-based security per the project requirements. This lead to a general
design issue this week that really caused us some...
|
by: rjames.clarke |
last post by:
I am developing an online application and the last thing I need to get
a handle on is security.
This app is very heavy with forms. Business critical data will be
entered via forms and inserted in...
|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data...
|
by: Mark |
last post by:
All,
I know this topic has been covered many times, but this particlar
question is of a subject which I am just learning (VB). Once I have
established what is possible, the individual will be...
|
by: cs5b |
last post by:
I am looking for the official javascript security specification for web
browsers. EMCAScript and DOM spec does not seem to contain a section on
security, so I assume none exists and the security...
|
by: nancy |
last post by:
I am new to PHP but have done other programming
can someone please hold my hand and slowly talk me through some simple
security issues?
I have seen in PHP documents that there are 'strip...
|
by: smjawad |
last post by:
Hi,
I am developing a system on which multiple front-end kiosks machines
will be connected to a central server. I am being asked for the
authentication mechanism for the machines, like how will...
|
by: Earl Anderson |
last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy,
but in an effort to furnish sufficient information (as opposed to too little
information) to you, I wanted to supply all...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
| |