473,405 Members | 2,310 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Adding users to secured database

Hello all,

Is there a way to add users to a secured database without having to go
into Security -> User and Group Accounts? I have a table for all
employees on a secure database, and want to be able to just add new
employees once (ie into the emplyee table not the security section),
and having it added to the user accounts.

Thanks in advance,
Therese
Nov 12 '05 #1
3 3709
You can perform security functions programattically from an user account
with the required permissions. There's good coverage in the Access <version>
Developer's Handbook by Litwin, Getz, et al, published by Sybex. There's
coverage in online documentation and the Microsoft web site, but it is
scattered and you have to search it out.

However, I'd caution that by keeping security information in just another
database table, you are likely compromising the security of your database.
Access security, while not unbreakable, is more difficult to break than it
is for someone to get into an Access table.

Larry Linson
Microsoft Access MVP
"Therese A. Sorna" <ta*****@yahoo.com> wrote in message
news:be**************************@posting.google.c om...
Hello all,

Is there a way to add users to a secured database without having to go
into Security -> User and Group Accounts? I have a table for all
employees on a secure database, and want to be able to just add new
employees once (ie into the emplyee table not the security section),
and having it added to the user accounts.

Thanks in advance,
Therese

Nov 12 '05 #2
Any hints on what I should search for on the microsoft website. I
have searched extensively, but have found nothing that shows me how to
do this. Or, perhaps you can share the code?

Thanks,
T

"Larry Linson" <bo*****@localhost.net> wrote in message news:<Jg***************@nwrddc02.gnilink.net>...
You can perform security functions programattically from an user account
with the required permissions. There's good coverage in the Access <version>
Developer's Handbook by Litwin, Getz, et al, published by Sybex. There's
coverage in online documentation and the Microsoft web site, but it is
scattered and you have to search it out.

However, I'd caution that by keeping security information in just another
database table, you are likely compromising the security of your database.
Access security, while not unbreakable, is more difficult to break than it
is for someone to get into an Access table.

Larry Linson
Microsoft Access MVP
"Therese A. Sorna" <ta*****@yahoo.com> wrote in message
news:be**************************@posting.google.c om...
Hello all,

Is there a way to add users to a secured database without having to go
into Security -> User and Group Accounts? I have a table for all
employees on a secure database, and want to be able to just add new
employees once (ie into the emplyee table not the security section),
and having it added to the user accounts.

Thanks in advance,
Therese

Nov 12 '05 #3
"Therese A. Sorna" wrote
Any hints on what I should search for
on the microsoft website. I have searched
extensively, but have found nothing that
shows me how to do this.
The only security item that I know about, for sure, is the Security FAQ
which can be downloaded from http://www.microsoft.com/downloads/. Two
places to _start_ searching would be the Knowledge Base at
http://support.microsoft.com, using Advanced Search, and the Microsoft
Developer Network site, http://msdn.microsoft.com.
Or, perhaps you can share the code?


The only security code that I have written was minimal, was done a long time
ago, and was in a client's proprietary database. Of course, I can't share
the code from the Developer's Handbook, because it is copyrighted - sorry.

Larry Linson
Microsoft Access MVP


Nov 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Kelly Bowles | last post by:
I have made a purchase requistion which I have been asked to put password protected copy of requestors signature. I am thinking that each signature will have to be scanned as a picture and linked...
2
by: Galina | last post by:
Hello I recently updated my database applications from MS Access 97 to Access 2000. I somehow missed that the security file also should have been updated. All went fine and smooth. The...
20
by: Keith G. Murphy | last post by:
I'm trying to get a feel for what most people are doing or consider best practice. Given a mod_perl application talking to a PostgreSQL database on the same host, where different users are...
6
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users,...
13
by: Jan | last post by:
Hi: I've used the /decompile switch lots of times when working with troublesome databases. Now, though, I have a database that is secured, and I can't get the /decompile switch to work with the...
12
by: chris.thomson | last post by:
Hi, Thanks in advance for any assistance regarding my question. I have setup a database with a WIF containing the usernames and p/words of several unique data entry operators who will be...
0
by: rdemyan | last post by:
I'm trying to use TransferDatabase to transfer tables from an external secured DB to a database created in the code. I would like to kind of use automation, although OpenCurrentDatabase apparantly...
1
by: securedcardss | last post by:
http://card.2youtop.info secured credit card card credit instant secured card cash credit secured card
2
by: gazelle04 | last post by:
I've been searching for an effective way of security an Access database. From creating database password, encrypting, disabling shift key at start up, and the user-level security. The user level...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.