473,394 Members | 1,715 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

Connect to back end for non logged on user

FE on workstations/BE on server. W2K to W2K server.

One of these users logs on to her local machine, not the domain (although
the machine is networked and she has permissions). I'm not there now, but my
experience here is that if you try to start on Access app logged onto the
local machine I get empty forms. Until I actually use network neighbourhood
to connect to some file or other on the server, via a logon dialogue.

Anybody know of a way to connect a user to the server/BE on the server
without logging them onto the domain?

Yours, Mike MacSween

Nov 12 '05 #1
2 1242
On Mon, 15 Dec 2003 09:15:57 -0000, "Mike MacSween"
<mi******************@btinternet.com> wrote:

What do you have in mind? A procedure to use network resources
without being validated by the server? And then presumably go where
you want to, defeating the entire Windows security infrastructure? No
way, Jose!

-Tom.

FE on workstations/BE on server. W2K to W2K server.

One of these users logs on to her local machine, not the domain (although
the machine is networked and she has permissions). I'm not there now, but my
experience here is that if you try to start on Access app logged onto the
local machine I get empty forms. Until I actually use network neighbourhood
to connect to some file or other on the server, via a logon dialogue.

Anybody know of a way to connect a user to the server/BE on the server
without logging them onto the domain?

Yours, Mike MacSween


Nov 12 '05 #2
"Tom van Stiphout" <to*****@no.spam.cox.net> wrote in message
news:eh********************************@4ax.com...
On Mon, 15 Dec 2003 09:15:57 -0000, "Mike MacSween"
<mi******************@btinternet.com> wrote:

What do you have in mind? A procedure to use network resources
without being validated by the server? And then presumably go where
you want to, defeating the entire Windows security infrastructure? No
way, Jose!


Mmm. Perhaps I didn't explain that very well.

Take this scenario. The user boots the workstation and chooses the 'logon to
xxxxx (this machine)'. In other words they aren't logging on to the network
domain. But the BE of the database lives on the server. So when they open
the FE - no records! Here I find that if I navigate to the server from
Explorer first, which will involve a 'enter the user name and password of a
user with rights to blah blah' I can open the FE, with records.

Does that make sense? Maybe not.

The reason? This user appears to 'have to' log on to the local machine
because of some licensing restriction with their accounting software. I
think they'd have to buy another licence if she logged onto the network. But
today she was fairly adamant she _didn't_ want access to the database, so
problem solved.

I agree. I'd rather work within the Windows security infrastructure, the way
it's meant to be.

Cheers, Mike
Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

33
by: Savas Ates | last post by:
in asp page im getting this error how can i solve it.. yesterday the codes work but i setup visual studio 6.0 now it doesnt works..
22
by: James Kupernik | last post by:
Hello everyone! I'm hoping someone can shed some light on my ever daunting mysql/php problem. I'm currently trying to get a new server up and running using apache/php/mysql. Everything runs...
10
by: Ed Stevens | last post by:
A tale of woe, and a question . . . Last week my boss said to me "we've installed DB2 Connect on this Solaris box. Make it work." Now, I've barely seen DB2 Connect on Windows, having fumbled...
1
by: Christian | last post by:
Hi, from a WinForms-app do I connect to a DB using a connectionstring : m_sqlConnection.ConnectionString = " workstation id=\"PC-WIN2000\"; packet size=4096;integrated security=SSPI; data...
3
by: asemeiks | last post by:
I'm using Access 97, Jet 4.0. the data resides on a Win 2000 domain server. Using .Net 1.1 and IIS 5.0 on a local XPPro computer I am trying connect to a Jet database on the server. If the data...
5
by: rAinDeEr | last post by:
Hi, Y'day one of my friend showed me how to connect to a Oracle database as SYSDBA, DBA etc I have DB2 UDB installed in Linux machine.Right now, I have a user WADI which has got some...
4
by: traceable1 | last post by:
I have a couple new servers - Windows 2003 R2 - with SQL Server 2000 SP4 installed. They are all Active/Active clustered instances (my first ones). I am trying to create database links to other...
18
by: rdemyan via AccessMonster.com | last post by:
Here's my plan for creating nightly backups of the production back-end file (the IT staff in their infinite wisdom have prevented use of Windows Scheduler and users do not have administrative...
1
by: Ben Hanson | last post by:
I've scoured Google searching for an answer that seems like it should be easy but apparently isn't...when I open SSMS to connect to a SQL 2005 database and choose Windows authentication, it greys...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.