473,395 Members | 1,554 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Adding a password protected field for a scanned signature

I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture and
linked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comes
out of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly
Nov 12 '05 #1
4 2838
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles" <ke*********@hotmail.com>
wrote:
I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture and
linked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comes
out of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly


First of all, you need to find out how strong the security requirements are
for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that the
average employee would figure out how to access the signatures, then Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by you,
and not by the Admin user, and all permissions for the Admin user have been
removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they were
done properly.

Next, you want to have the table containing the signature images and passwords
secured so that only you have access to it, then create a query also owned by
you and with read-only permissions for others, and set the Owner Permissions
property which allows the query to run with your permissions even when run by
someone else. For the query criteria, you want to restrict the output to rows
where the password matches a control on a form into which the user will have
entered the password (e.g. Forms!frmSecurity!txtPassword). The form should
use the Password input mask, so other users can't read the password on the
screen.
Nov 12 '05 #2
I have ordered Real World Microsoft Access Database Protection and Security
by Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam.nospam> wrote in message
news:4v********************************@4ax.com...
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles" <ke*********@hotmail.com> wrote:
I have made a purchase requistion which I have been asked to put password
protected copy of requestors signature.
I am thinking that each signature will have to be scanned as a picture andlinked by some sort of password .

I wanted to tell them just have everybody sign the documents when it comesout of the printer.
I was shown that it was done on another form. It was not Access and I was
not allowed to take the form apart.

Thanks,
Kelly

First of all, you need to find out how strong the security requirements

are for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that the average employee would figure out how to access the signatures, then Access is probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by you, and not by the Admin user, and all permissions for the Admin user have been removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they were done properly.

Next, you want to have the table containing the signature images and passwords secured so that only you have access to it, then create a query also owned by you and with read-only permissions for others, and set the Owner Permissions property which allows the query to run with your permissions even when run by someone else. For the query criteria, you want to restrict the output to rows where the password matches a control on a form into which the user will have entered the password (e.g. Forms!frmSecurity!txtPassword). The form should use the Password input mask, so other users can't read the password on the
screen.


Nov 12 '05 #3
Ah, I didn't mean you necessarily needed a single book just on Access
Security, just that you needed a reputable book on Access with a decent
chapter on the subject if you don't already have one.

On Mon, 26 Jan 2004 11:26:07 -0600, "Kelly Bowles" <ke******@hotmail.com>
wrote:
I have ordered Real World Microsoft Access Database Protection and Security
by Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam.nospam> wrote in message
news:4v********************************@4ax.com.. .
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles"

<ke*********@hotmail.com>
wrote:
>I have made a purchase requistion which I have been asked to put password
>protected copy of requestors signature.
>I am thinking that each signature will have to be scanned as a pictureand >linked by some sort of password .
>
>I wanted to tell them just have everybody sign the documents when itcomes >out of the printer.
>I was shown that it was done on another form. It was not Access and I was
>not allowed to take the form apart.
>
>Thanks,
>Kelly
>


First of all, you need to find out how strong the security requirements

are
for protecting the signature. If they're sufficiently high, then Access
cannot do the job. If it is sufficient to simply make it unlikely that

the
average employee would figure out how to access the signatures, then

Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a
properly secured database meaning that the database itself is owned by

you,
and not by the Admin user, and all permissions for the Admin user have

been
removed, etc. If you don't know all about this, get an Access book that
covers it, and make sure you've done all the steps, and tested that they

were
done properly.

Next, you want to have the table containing the signature images and

passwords
secured so that only you have access to it, then create a query also owned

by
you and with read-only permissions for others, and set the Owner

Permissions
property which allows the query to run with your permissions even when run

by
someone else. For the query criteria, you want to restrict the output to

rows
where the password matches a control on a form into which the user will

have
entered the password (e.g. Forms!frmSecurity!txtPassword). The form

should
use the Password input mask, so other users can't read the password on the
screen.



Nov 12 '05 #4
A "more than decent" chapter on Access security, in fact, the only
"authority" on the subject that I recommend is the Microsoft Access Security
FAQ which is described at
http://support.microsoft.com/default...NoWebContent=1,
which also includes the address from which it can be downloaded.

Larry Linson
Microsoft Access MVP

"Steve Jorgensen" <no****@nospam.nospam> wrote in message
news:78********************************@4ax.com...
Ah, I didn't mean you necessarily needed a single book just on Access
Security, just that you needed a reputable book on Access with a decent
chapter on the subject if you don't already have one.

On Mon, 26 Jan 2004 11:26:07 -0600, "Kelly Bowles" <ke******@hotmail.com>
wrote:
I have ordered Real World Microsoft Access Database Protection and Securityby Garry Robinson. Any other recommendations or suggestions are greatly
appreciated.

Thanks
Kelly
"Steve Jorgensen" <no****@nospam.nospam> wrote in message
news:4v********************************@4ax.com.. .
On Mon, 26 Jan 2004 01:06:25 -0600, "Kelly Bowles"

<ke*********@hotmail.com>
wrote:

>I have made a purchase requistion which I have been asked to put password >protected copy of requestors signature.
>I am thinking that each signature will have to be scanned as a picture

and
>linked by some sort of password .
>
>I wanted to tell them just have everybody sign the documents when it

comes
>out of the printer.
>I was shown that it was done on another form. It was not Access and I was >not allowed to take the form apart.
>
>Thanks,
>Kelly
>

First of all, you need to find out how strong the security requirements

are
for protecting the signature. If they're sufficiently high, then Access cannot do the job. If it is sufficient to simply make it unlikely that

the
average employee would figure out how to access the signatures, then

Access is
probably OK.

So given that Access is adequate, you want to first make sure you have a properly secured database meaning that the database itself is owned by

you,
and not by the Admin user, and all permissions for the Admin user have

been
removed, etc. If you don't know all about this, get an Access book that covers it, and make sure you've done all the steps, and tested that they
were
done properly.

Next, you want to have the table containing the signature images and

passwords
secured so that only you have access to it, then create a query also
ownedby
you and with read-only permissions for others, and set the Owner

Permissions
property which allows the query to run with your permissions even when
runby
someone else. For the query criteria, you want to restrict the output
torows
where the password matches a control on a form into which the user will

have
entered the password (e.g. Forms!frmSecurity!txtPassword). The form

should
use the Password input mask, so other users can't read the password on

the screen.


Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Chris | last post by:
I have a frontend that has some tables which are linked to a backend. Now I want to make the backend password protected and when I try to run it password protected I can't open it. In the first...
4
by: MS | last post by:
Access 97 I have an Access FE that reconnects "automatically" regardless of whether the FE or BE have been moved to another folder. To achieve this, I have used Peter Vukovic's ( ...
4
by: Geir Baardsen | last post by:
Hi! 1. I wonder if there is a possibility to open a BackEnd.Db from the opening form, the form e.g.: frmOrders, in the FrontEnd.Db, when the BackEnd.Db is password protected? 2. Do I need to do...
2
by: Clayton Hamilton | last post by:
I have a DataGrid on a webform bound to a Datasource and can successfully use <ItemTemplate> to create edit/update/cancel functionality for user maintenance of data. I use separate logic to delete...
0
by: Fabrice DG | last post by:
Hi all. I don't know if this post is really at the right place but I hope someone can help me.. I developed a NT service, in order to automate mail exchanges between different kind of users This...
3
by: Jim Heavey | last post by:
Trying to figure out the technique which should be used to add rows to a datagrid. I am thinking that I would want an "Add" button on the footer, but I am not quite sure how to do that. Is that...
0
by: ganesh22 | last post by:
Hi... Iam using GridView in asp.net(2.0) .My requirement is user can add,update,delete in gridview I written the code for add & update but can u help adding rows in grid view My code: ...
1
by: Anoosha | last post by:
Need an urgent help! I use HP 8300 Scanjet to scan a page. The page consists of a barcode at the top of the page, some text information at the middle of the page and a SIGNATURE inside a square...
2
by: Ken Fine | last post by:
I want to add the security question and answer security feature to the ChangePassword control. I am aware that this functionality is built into the PasswordRecovery tool. I have implemented the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.