473,405 Members | 2,185 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Security/Permissions questions ACC 2000

Greetings all!

I am aiming to set up simple permissions for users on a database here
at work, to the effect that certain users should be restricted from
opening certain forms and reports. I tried setting up groups and
permissions, but found that users were still able to open forms I had
thought would have been restricted. I then tried the security wizard,
and found that TOO restrictive, especially if I find another job and
am not around to help if problems come up later on.

So, two questions:

1. Shouldn't setting passwords and permissions, WITHOUT the security
wizard, restrict users in the manner I'd expected? If not, why not?

2. Now that I've removed the password for the Admin account and can
get into all databases without passwords again, is it safe to delete
the Secured.mdw file, along with the database I'd attempted to secure
using the wizard?

FYI, after running the security wizard, I was unable to get into the
secured database, but could get into other databases using the proper
password.

Thanks all!

David Ingram
da********@earthlink.net
Nov 12 '05 #1
2 1416
On 5 Apr 2004 09:35:17 -0700, da********@earthlink.net (David Ingram)
wrote:

It's been said here so many times, it's surprising you haven't heard
it yet: Access security is an advanced topic. Download, study, and
fully understand the Access security faq from microsoft.com. Anything
else will cause grief in the long run.

-Tom.
Greetings all!

I am aiming to set up simple permissions for users on a database here
at work, to the effect that certain users should be restricted from
opening certain forms and reports. I tried setting up groups and
permissions, but found that users were still able to open forms I had
thought would have been restricted. I then tried the security wizard,
and found that TOO restrictive, especially if I find another job and
am not around to help if problems come up later on.

So, two questions:

1. Shouldn't setting passwords and permissions, WITHOUT the security
wizard, restrict users in the manner I'd expected? If not, why not?

2. Now that I've removed the password for the Admin account and can
get into all databases without passwords again, is it safe to delete
the Secured.mdw file, along with the database I'd attempted to secure
using the wizard?

FYI, after running the security wizard, I was unable to get into the
secured database, but could get into other databases using the proper
password.

Thanks all!

David Ingram
da********@earthlink.net


Nov 12 '05 #2
Yes, perhaps after having posted my question (perhaps not?) I followed
this advice and am beginning to read through the FAQ now. However,
it's interesting to note that I seem to remember having set up
permissions/restrictions on Access databases in the past, and it was a
simple matter of establishing passwords and defining permissions.

I had hoped that perhaps the Workgroup ID-related stuff might have
been a "more advanced" version of security, and that there might be a
more "for idiots" security version I could quickly master.

I'm sure that either I'm remembering wrongly or the version of Access
that I last "secured" was based on an older paradigm long since
abandoned as ineffective. Or maybe it was considered for wimps? Too
easy?

At any rate, if anyone can weigh in with an even-more-basic
distillation of the nuts and bolts of the process it would be most
helpful! Any recollections of past versions wherein the process was
indeed much simpler? Or am I crazy?

Thanks!

David Ingram
da********@earthlink.net

Tom van Stiphout <to*****@no.spam.cox.net> wrote in message news:<g6********************************@4ax.com>. ..
On 5 Apr 2004 09:35:17 -0700, da********@earthlink.net (David Ingram)
wrote:

It's been said here so many times, it's surprising you haven't heard
it yet: Access security is an advanced topic. Download, study, and
fully understand the Access security faq from microsoft.com. Anything
else will cause grief in the long run.

-Tom.
Greetings all!

I am aiming to set up simple permissions for users on a database here
at work, to the effect that certain users should be restricted from
opening certain forms and reports. I tried setting up groups and
permissions, but found that users were still able to open forms I had
thought would have been restricted. I then tried the security wizard,
and found that TOO restrictive, especially if I find another job and
am not around to help if problems come up later on.

So, two questions:

1. Shouldn't setting passwords and permissions, WITHOUT the security
wizard, restrict users in the manner I'd expected? If not, why not?

2. Now that I've removed the password for the Admin account and can
get into all databases without passwords again, is it safe to delete
the Secured.mdw file, along with the database I'd attempted to secure
using the wizard?

FYI, after running the security wizard, I was unable to get into the
secured database, but could get into other databases using the proper
password.

Thanks all!

David Ingram
da********@earthlink.net

Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: craig | last post by:
I am working on my first .NET development project that involves custom role-based security per the project requirements. This lead to a general design issue this week that really caused us some...
2
by: David Ingram | last post by:
Greetings all! I am aiming to set up simple permissions for users on a database here at work, to the effect that certain users should be restricted from opening certain forms and reports. I...
16
by: Lyle Fairfield | last post by:
There is an MS-SQL table named Bugs_Comments_and_Suggestions. There is a form named Bugs_Comments_and_Suggestions. To allow John Doe to use this form, we GRANT him LOGIN and ACCESS permissions...
2
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a...
5
by: Ken Cox [Microsoft MVP] | last post by:
MS has posted this here: http://www.asp.net/faq/ms03-32-issue.aspx Fix for: 'Server Application Unavailable' Error after Applying Security Update for IE...
29
by: Patrick | last post by:
I have the following code, which regardless which works fine and logs to the EventViewer regardless of whether <processModel/> section of machine.config is set to username="SYSTEM" or "machine" ...
6
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users,...
5
by: Henry Stock | last post by:
I am trying to understand the following error: Any thing you can tell me about this is appreciated. Security Exception Description: The application attempted to perform an operation not allowed...
6
by: plaguna | last post by:
Basically I have Three questions about Jet U-L Security: 1.Every time I create new Groups, new Users and Permissions using the User and Group Accounts dialog box, It creates User security for...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.