473,396 Members | 1,693 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Removing Security?

Hi,
I created an Access XP database, and then disabled all the menus that
allowed users to modify report design, etc... (I'll call them
administrative features). Users were only able to use record handling
options and the forms I designed. However, if I were to run the
database with a shift + double click, I would get the administrative
features again.

I didn't like this, so I tried to lock out the administrative features
by password protecting administrative access. I did this, but
unfortunately two problems resulted:

1) It is now impossible to access administrative features. When I run
the database, I am prompted with a password and all I see are the
record navigation options no matter how I ran the database. I can no
longer design reports, add forms, etc...

2) The password protection isn't a property of the database, but of
Access in general. If I run ANY database, I am confronted with the
same password protection. The other side of this is that anyone who
runs the database from a different machine is not subject to the
security settings I created.
I tried uninstalling and reinstalling Access (and the entire Office
XP) but to no avail. I read that a certain file was responsible for
Access security, but I could not find it.

Therefore, I have the following questions:

1) How can I re-acquire administrative features?

2) How can I remove this password?

3) How can I set a password for administrative access on a particular
database? I want regular users to get into the database without a
password, but one to be required when someone tries to gain access to
administrative features. This should be effective regardless of what
machine the user is on and should only be in effect for that database.

Thanks!
Nov 12 '05 #1
1 2356
TC

<xm****@yahoo.com> wrote in message
news:4a**************************@posting.google.c om...

(snip)

2) The password protection isn't a property of the database, but of Access in general.

No, it is a property of the Workgroup Information File that is in effect
when you start that session of Access. There can be many different workgroup
files: all secured, all unsecured, or any mixture thereof.

If I run ANY database, I am confronted with the same password protection.
Only if you set security in the >default< workgroup file. What you should
have done, is to create a >new< workgroup file, & use that to secure your
database. You also use a shortcut to start the secured database. The
shortcut selects the correct workgroup file to use. By that means, your
secured databaase is fully secured, but no other databases are affected.

The other side of this is that anyone who runs the database from a different machine is not subject to the security settings I created.

Then you did not do it properly.

You need to read-up on Access security. Google for the "Security FAQ". Read
it 50 gazillion times. Plan to spend at least a few weeks to get a basic
understanding of how to do it properly. Follow >all< the steps given, inexactly the sequence< they are given, adding & omitting nothing. Access

security is quite sophisticated. But it is tough to learn, initially.

HTH,
TC
Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: chotiwallah | last post by:
i have a little database driven content managment system. people can load up html-docs. some of them use ms word as their html-editor, which resultes in loads of "class" and "style" attributes -...
2
by: Maria | last post by:
Here's what I'm trying to do: I have a web page that's calling the server variable LOGON_USER to retrieve the userid of the person accessing it. The web has anonymous access disabled, and...
0
by: -Michelle- | last post by:
Hi Before anyone blasts me for posting a question that the solution clearly appears in the help file, please read on. I keep getting the Security Warning : Opening.. x database may not be...
0
by: sameer mowade via .NET 247 | last post by:
Hello All, I have problem while dynamically removing row from the Datagrid which i have added dynamically as shown in the following code snippet. The problem is that while removing dynamically...
6
by: Niyazi | last post by:
Hi all, What is fastest way removing duplicated value from string array using vb.net? Here is what currently I am doing but the the array contains over 16000 items. And it just do it in 10 or...
2
by: techi_C | last post by:
Hi I'm getting a problem while removing semaphore from system. Before removing semaphore I'm checking the usage count of a smaphore. // checking usage count usage_count =...
1
by: gafchic | last post by:
I have inherited a db at my workplace which has security on it. I would like to remove the security from it. I can logon to the database with an account that is in the admins, full permissions and...
0
by: =?Utf-8?B?ZWQ=?= | last post by:
I had this exact problem using a vb.net client accessing a Java web service. The solution takes 3 steps: 1.) Create custom ClientOutputFilter 2.) Create a custom Assertion that uses filter from...
3
by: Salad | last post by:
If a person has a MDB secured with user-level security that uses an MDW, what steps does one take to fully remove the user-level security.
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.