473,399 Members | 3,106 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

Security on back-end Access 2002 database.

icb
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.

Prior to splitting the database I ran the security wizard and used a
shortcut from the desktop. All fine except of course I can open the
back-end directly. The security FAQ appears to be out of date insofar
as there is no wrkgadm.exe with 2002 and therefore you simply run the
security wizard without having to go through the steps you had to in
previous versions (much better!)

I have tried to run the wizard on the back-end thinking I could 'join'
the previously created .MDW for the front-end. The wizard won't allow
that so I created a new one but then I cannot see any data in the
front-end. I suppose I could join directly but that is not ideal as
any database I open from the same location as the back-end will
require a logon. Any ideas?

Thanks
Paul
Nov 12 '05 #1
3 1678
ia**@mailblocks.com (icb) wrote:
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.

Prior to splitting the database I ran the security wizard and used a
shortcut from the desktop. All fine except of course I can open the
back-end directly. The security FAQ appears to be out of date insofar
as there is no wrkgadm.exe with 2002 and therefore you simply run the
security wizard without having to go through the steps you had to in
previous versions (much better!)

I have tried to run the wizard on the back-end thinking I could 'join'
the previously created .MDW for the front-end. The wizard won't allow
that so I created a new one but then I cannot see any data in the
front-end. I suppose I could join directly but that is not ideal as
any database I open from the same location as the back-end will
require a logon. Any ideas?

Thanks
Paul


Hi Paul.

I've never used A2002 (still on A97 & 2k) but my guess is that what you
need to do is open your FE (join the workgroup) then create a new blank
database from File ... New to import your BE objects into.

Very surprised to read your comment about there being no workgroup
administrator. There must be one somewhere! I'm on my A97 PC at the moment
so can't check, but I seem to remember that the A2k variant is called
something other than wrkgadm.exe.

HTH - Keith.
www.keithwilby.org.uk
Nov 12 '05 #2
"icb" <ia**@mailblocks.com> wrote in message
news:d5**************************@posting.google.c om...
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.

Prior to splitting the database I ran the security wizard and used a
shortcut from the desktop. All fine except of course I can open the
back-end directly. The security FAQ appears to be out of date insofar
as there is no wrkgadm.exe with 2002 and therefore you simply run the
security wizard without having to go through the steps you had to in
previous versions (much better!)

I have tried to run the wizard on the back-end thinking I could 'join'
the previously created .MDW for the front-end. The wizard won't allow
that so I created a new one but then I cannot see any data in the
front-end. I suppose I could join directly but that is not ideal as
any database I open from the same location as the back-end will
require a logon. Any ideas?

Thanks
Paul

In Access XP they moved the workgroup administrator so that it is now
accessible from within Access Tools>Security>Workgroup Administrator, which
I think was quite a sensible thing to do.

I would be slightly cautious about using the security wizard, unless you are
sure you could do everything without it if necessary (and then you might not
need it). Anyway, from memory, I believe this is what you would have to do:

As a member of the standard system.mdw workgroup, run the security wizard
for the back end, creating a new mdw. When you have finished this, join
this new mdw, open the front end and run the wizard again. This will let
you modify the workgroup information so you secure both halves with the same
mdw. When you are finished, go back and re-join the standard workgroup and
use a shortcut to start open the database with the new mdw.

Fletcher

Nov 12 '05 #3
icb
"Fletcher Arnold" <fl****@home.com> wrote in message news:<bv*********@titan.btinternet.com>...
"icb" <ia**@mailblocks.com> wrote in message
news:d5**************************@posting.google.c om...
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.

Prior to splitting the database I ran the security wizard and used a
shortcut from the desktop. All fine except of course I can open the
back-end directly. The security FAQ appears to be out of date insofar
as there is no wrkgadm.exe with 2002 and therefore you simply run the
security wizard without having to go through the steps you had to in
previous versions (much better!)

I have tried to run the wizard on the back-end thinking I could 'join'
the previously created .MDW for the front-end. The wizard won't allow
that so I created a new one but then I cannot see any data in the
front-end. I suppose I could join directly but that is not ideal as
any database I open from the same location as the back-end will
require a logon. Any ideas?

Thanks
Paul

In Access XP they moved the workgroup administrator so that it is now
accessible from within Access Tools>Security>Workgroup Administrator, which
I think was quite a sensible thing to do.

I would be slightly cautious about using the security wizard, unless you are
sure you could do everything without it if necessary (and then you might not
need it). Anyway, from memory, I believe this is what you would have to do:

As a member of the standard system.mdw workgroup, run the security wizard
for the back end, creating a new mdw. When you have finished this, join
this new mdw, open the front end and run the wizard again. This will let
you modify the workgroup information so you secure both halves with the same
mdw. When you are finished, go back and re-join the standard workgroup and
use a shortcut to start open the database with the new mdw.

Fletcher


Thanks for the advice - it worked!

wrkgadm.exe doesn't ship with Windows XP and as you said is part of
Access now. I have always used the 'manual' method of setting up
security but I found that with this method in Access 2002 I could
still open the database directly from explorer. I tried the wizard and
it worked fine but still had the problem as discussed above.

Anyhow it works and I now understand the logic. I can open the front
end directly but not the back end. When I try to open a linked table
in the front end I do not have permissions - perfect. Now to set up
permissions for users.

Once again thanks and a lot more straightforward than Microsoft's own
explanation on MSDN:

http://msdn.microsoft.com/library/de...ndsolution.asp

Paul
Nov 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Chris Mosser | last post by:
I'm still somewhat new with php, only able to play with it now and again. Anyway, I was recently sent an email about poss security flaws, not in php itself but in my code on a site that I am...
9
by: Pascal Vyncke | last post by:
Hi, I discovered a NEW security hole / exploit in IE6 with SP2 and all the latest security patches. Overview of the exploit: * Bug for all Microsoft Internet Explorer users * Can be...
1
by: yatharth | last post by:
Hi, Its Urget plz help me out on this issue. I m working on a project in which we have used both java and .net, and the issue is how to maintain security ,if we move from java page link to...
2
by: orekinbck | last post by:
Hi There I am inheriting from DateTimePicker class to create a DateTimePicker control with a configurable back colour. I got the original code from http://dotnet.mvps.org/ then converted it to...
16
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is...
5
by: nicholas | last post by:
I have a website designed in ASP.NET In my BIN-folder I have several .NET dll-files: DreamweaverCtrls.dll FreeTextBox.dll WebXelMail.dll Now, for "security" reason my hoster told me it is...
2
by: AVL | last post by:
Hi, I want to use the Security application blcok in my application. I installed the Enterprise library and read the documentation. but still it's not very clear to me. Can anyone suggest few...
0
by: honcho | last post by:
My ASP.NET web application has a flaw that produces false security-violation alarms. There are several categories of users for this web site, e.g. Colonels, Sergeants, Private_1s, and...
0
by: QLD_AU | last post by:
Has anyone found a way of listing back security groups only using System.DirectoryServices ? I have found heaps of references to finding what group a user is, however i am trying to just find a...
4
by: oopaevah | last post by:
What are the pitfalls of passing a token in the url once a user is logged on so I can remember who they are? I can easily implement this by adding &token=abcdefghijklmnop123 to each internal...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.