473,508 Members | 2,133 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing Microsoft Access Application

Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil
Nov 12 '05 #1
4 2151
Giloosh wrote:
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil


Check out the "Microsoft Access Security FAQ" section from this newsgroup's
FAQ, posted 03/05/04 at 18:04.
Nov 12 '05 #2
>
My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.


All of the features you need to hide the ms-access part and keep users out
can be done via tools->start-up. So, you don't even need to setup security
or anything else.

You should of course give your users a mde file..as that means the code and
forms etc. can not be changed (but, remember to keep your original mdb..as a
mde cannot be reversed back to the original design mdb).

Try downloading and running the 3rd example at:

http://www.attcanada.net/~kallal.msn...s/DownLoad.htm

If run it..you will see how all of the access interface is hidden. Now,
exit..and re-run holding down the shift key to "sneak" in:

Take a look at the options that I set in the tools->start-up...
--
Albert D. Kallal (MVP)
Edmonton, Alberta Canada
pl******************@msn.com
http://www.attcanada.net/~kallal.msn

Nov 12 '05 #3
Use the built in security wizzard. Create Users. Create groups or use
the built in ones. Assign users to group/s. Set appropriate
permissions on objects.

Start the db using the system.mdw file. Access call create the
shorcuts for you.


gi*******@hotmail.com (Giloosh) wrote in message news:<ca**************************@posting.google. com>...
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil

Nov 12 '05 #4
Thanks alot guys! the startup feature and MDE method works great,
thats about all i needed.
thanks alot
gil
me****@hotmail.com (Andrew) wrote in message news:<a0**************************@posting.google. com>...
Use the built in security wizzard. Create Users. Create groups or use
the built in ones. Assign users to group/s. Set appropriate
permissions on objects.

Start the db using the system.mdw file. Access call create the
shorcuts for you.


gi*******@hotmail.com (Giloosh) wrote in message news:<ca**************************@posting.google. com>...
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil

Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
1387
by: Graeme Coutts | last post by:
Developed a web application which adopts a custom security model which displays a login page and requests a username/password combination. The username works in a mixed-mode of usernames matched with...
3
377
by: Giloosh | last post by:
Hello, i have a microsoft access application and right now, anyone knowing how to use microsoft-access can easily go behind the applicatio, design the forms, delete edit/tables etc... There is...
11
1881
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
3
1792
by: | last post by:
I've secured my Access database by creating an MDE file because it contains confidential data. However, I find that anyone can simply use Microsoft Access to link to or import the tables in that...
7
2194
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
11
3405
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
1
1415
by: abdulrauf | last post by:
Hope someone can help. I am trying to build an application that will allow a user to access/deny an application, the application's individual pages, and the forms within the individual pages. ...
9
1770
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1....
4
3887
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+...
10
3323
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
0
7124
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
7385
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
1
7046
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
5629
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
5053
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
4707
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
1558
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
1
766
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
418
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.