473,387 Members | 1,420 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

NT File permissions, 'hardening' Access security

I'm not talking Access Users & Groups, I may or may not implement that. Even
if I do file/folder rights still need to be managed.

I've searched the archives and read the many postings. The basic problem
seems to be this:

Access is a 'file server' based system. So if you want your users to use the
db they've got to have access to the file. And can do stuff to it you might
not want.

David Fenton had a good idea, ShareName$ hides the Share. But you need admin
privileges to name shares, and in this case I won't ever have them.

So this is what I came up with. The app is FE/BE split. FE on whichever
workstations, BE on a network share. MIS have set the share up for me, and I
have
full control permissions over that. I just tried this on my network, which
is the same config as the one at work (roughly speaking!) - XP clients,
Win2K
Server.

On the folder containing the backend I give users write privileges, but
nothing else, specifically denying them List Folder/Read Data. But letting
them delete subfolders/files (to get rid of the ldb.)

On the backend mdb (which is in that folder) I give them Read, Read &
Execute
rights, and don't allow inherited rights. This is for a user I intend to
only be read only. This seemed to work. Logging on as my 'ReadOnly' user I
could read the data, but couldn't update it, insert or whatever. The ldb
file was created and deleted fine, but I couldn't examine the contents of
the folder. Am I missing something?

Often I've heard it said that you can't stop people simply copying the file,
whatever you do with NT permissions. That doesn't seem to be the case here.
Or am I right in thinking that they could just copy the whole folder?

I'll try it now, and see what happens with my read/write user too......

Nope, neither user could copy the whole folder (to get at the file). Both
users could connect to the data in the way I intend (read only or read
write). The ldb gets created and deleted as the last user logs off.

This seems like a fairly robust setup, as far as the back end data file is
concerned. So what huge hole have I missed?

Yours, Mike MacSween

Nov 12 '05 #1
2 2886
On Thu, 6 Nov 2003 20:21:51 -0000, "Mike MacSween"
<mi******************@btinternet.com> wrote:

Not sure what exactly you are trying to achieve, but it appears
denying the right to copy the BE file is one of them. However, users
can import the BE tables in a local MDB they created. Indeed the file
was not copied, but the precious data is.

-Tom.
I'm not talking Access Users & Groups, I may or may not implement that. Even
if I do file/folder rights still need to be managed.

I've searched the archives and read the many postings. The basic problem
seems to be this:

Access is a 'file server' based system. So if you want your users to use the
db they've got to have access to the file. And can do stuff to it you might
not want.

David Fenton had a good idea, ShareName$ hides the Share. But you need admin
privileges to name shares, and in this case I won't ever have them.

So this is what I came up with. The app is FE/BE split. FE on whichever
workstations, BE on a network share. MIS have set the share up for me, and I
have
full control permissions over that. I just tried this on my network, which
is the same config as the one at work (roughly speaking!) - XP clients,
Win2K
Server.

On the folder containing the backend I give users write privileges, but
nothing else, specifically denying them List Folder/Read Data. But letting
them delete subfolders/files (to get rid of the ldb.)

On the backend mdb (which is in that folder) I give them Read, Read &
Execute
rights, and don't allow inherited rights. This is for a user I intend to
only be read only. This seemed to work. Logging on as my 'ReadOnly' user I
could read the data, but couldn't update it, insert or whatever. The ldb
file was created and deleted fine, but I couldn't examine the contents of
the folder. Am I missing something?

Often I've heard it said that you can't stop people simply copying the file,
whatever you do with NT permissions. That doesn't seem to be the case here.
Or am I right in thinking that they could just copy the whole folder?

I'll try it now, and see what happens with my read/write user too......

Nope, neither user could copy the whole folder (to get at the file). Both
users could connect to the data in the way I intend (read only or read
write). The ldb gets created and deleted as the last user logs off.

This seems like a fairly robust setup, as far as the back end data file is
concerned. So what huge hole have I missed?

Yours, Mike MacSween


Nov 12 '05 #2
"Tom van Stiphout" <to*****@no.spam.cox.net> wrote in message
news:tk********************************@4ax.com...
On Thu, 6 Nov 2003 20:21:51 -0000, "Mike MacSween"
<mi******************@btinternet.com> wrote:

Not sure what exactly you are trying to achieve, but it appears
denying the right to copy the BE file is one of them.
Yes, that's one of them.
However, users
can import the BE tables in a local MDB they created. Indeed the file
was not copied, but the precious data is.


Sure. But that would be a little harder. They'd have to know about the
bypass key. And I can always disallow that.

The data aren't that precious. More what I want to do is just stop people
messing with this. This is a student marks database at a college I teach at.
At the end of last year, despite me saying specifically that it wasn't set
up for multi user access, one of my superiors told our clerical officer to
'copy the file onto the shared area'. Of course they didn't have a clue what
they were doing, that there were 2 files, consequently it didn't work. Then
one day something else went wrong when I wan't there, the head of MIS had to
be called to rescue the situation (call the cavalry!). He doesn't really
know Access either, but managed to figure out that one file was 'linked' to
another. So copied them both to another 'backup' directory. Now our clerical
officer tells me, 'oh, since that time it went wrong we've been using the
backup that the head of MIS made'. Of course, he didn't change the links, so
the FE that he'd copied still had linked tables in the 'old' BE. No doubt he
assumed you just copied them both about and 'hey presto'. I know that's what
he thought because I asked him if he'd remade the table links to the new
directory and he didn't know what I was talking about.

Upshot is, it's their database, but I developed it. I want to do as much as
I can to stop people copying it about all over the place. People taking the
data isn't really crucial. After students are awarded degrees then it's all
public anyway. But the level of IT knowledge amongst my colleagues is
minimal. I want stop people making umpteen copies, then nobody knowing which
the most up to date one is, replacing the live one etc. etc. At least not
without consulting me first.

I'd not thought about people copying the actual tables, thanks. Presumably
if I dissallow bypass key and don't show the the database window, it's going
to take a pretty sophisicated user to get any data out of that, except
through the interface, yes?

Yours, Mike MacSween
Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Fran Tirimo | last post by:
I am developing a small website using ASP scripts to format data retrieved from an Access database. It will run on a Windows 2003 server supporting FrontPage extensions 2002 hosted by the company...
2
by: Fran Tirimo | last post by:
I am developing a small website using ASP scripts to format data retrieved from an Access database. It will run on a Windows 2003 server supporting FrontPage extensions 2002 hosted by the company...
1
by: fripper | last post by:
I have just installed Visual Studio .Net Academic 2003 and MSDN Academic 2003. In testing a program that I had written in the 2002 version I find that when I use fileopen to access a file I get: ...
1
by: raydelex | last post by:
I am new to securing a database with logins. My questions is: I want only one database to use a new Workgroup file that I have created, not all the Access databases that I bring up under my...
9
by: Ben Dewey | last post by:
Project: ---------------------------- I am creating a HTTPS File Transfer App using ASP.NET and C#. I am utilizing ActiveDirectory and windows security to manage the permissions. Why reinvent...
11
by: sur | last post by:
Hello, My problem is that File.Exists works fine if my file is on my local drive but returns false if its on any other drive. I think that the issue is probably file permissions and so I have...
0
by: kamiller | last post by:
Help our ASP.NET Application Fails to create SQL Connection after Server Security Hardening System worked perfectly until Security ran "Hardening Scripts" Errors caught by ExceptionManagement...
15
by: David Thielen | last post by:
Hi; My ASP.NET app (C# calling J# under .net 2.0) creates a png file in a subdirectory to display as part of the created page. However, the bitmap will not display due to a security violation. ...
3
by: Mike | last post by:
Hi I have problem as folow: Caught Exception: System.Configuration.ConfigurationErrorsException: An error occurred loading a configuration file: Request for the permission of type...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.