473,394 Members | 1,932 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

Securing Microsoft Access Application

Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil
Nov 12 '05 #1
4 2140
Giloosh wrote:
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil


Check out the "Microsoft Access Security FAQ" section from this newsgroup's
FAQ, posted 03/05/04 at 18:04.
Nov 12 '05 #2
>
My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.


All of the features you need to hide the ms-access part and keep users out
can be done via tools->start-up. So, you don't even need to setup security
or anything else.

You should of course give your users a mde file..as that means the code and
forms etc. can not be changed (but, remember to keep your original mdb..as a
mde cannot be reversed back to the original design mdb).

Try downloading and running the 3rd example at:

http://www.attcanada.net/~kallal.msn...s/DownLoad.htm

If run it..you will see how all of the access interface is hidden. Now,
exit..and re-run holding down the shift key to "sneak" in:

Take a look at the options that I set in the tools->start-up...
--
Albert D. Kallal (MVP)
Edmonton, Alberta Canada
pl******************@msn.com
http://www.attcanada.net/~kallal.msn

Nov 12 '05 #3
Use the built in security wizzard. Create Users. Create groups or use
the built in ones. Assign users to group/s. Set appropriate
permissions on objects.

Start the db using the system.mdw file. Access call create the
shorcuts for you.


gi*******@hotmail.com (Giloosh) wrote in message news:<ca**************************@posting.google. com>...
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil

Nov 12 '05 #4
Thanks alot guys! the startup feature and MDE method works great,
thats about all i needed.
thanks alot
gil
me****@hotmail.com (Andrew) wrote in message news:<a0**************************@posting.google. com>...
Use the built in security wizzard. Create Users. Create groups or use
the built in ones. Assign users to group/s. Set appropriate
permissions on objects.

Start the db using the system.mdw file. Access call create the
shorcuts for you.


gi*******@hotmail.com (Giloosh) wrote in message news:<ca**************************@posting.google. com>...
Hello, i have a microsoft access application and right now, anyone
knowing how to use microsoft-access can easily go behind the
applicatio, design the forms, delete edit/tables etc... There is
basically no security on the application.

My question is... how do i secure the application, preventing any
access to the "back" or Source (tables,queries,forms,macros...) of the
application? or even preventing getting into the design view of the
form.

A good example of what i want is on this site :
http://www.jamiessoftware.tk
I downloaded the demo, and the software is secure. I cant mess with
any of its source.
I just want my app to have its own custom menus and commands, leaving
access' defualt commands out of it, that way preventing users to go
behind it and mess with the source.
Could anyone please explain any procedures, or any reference sites?
Any help will be highly appreicated
Thanks!
Gil

Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Graeme Coutts | last post by:
Developed a web application which adopts a custom security model which displays a login page and requests a username/password combination. The username works in a mixed-mode of usernames matched with...
3
by: Giloosh | last post by:
Hello, i have a microsoft access application and right now, anyone knowing how to use microsoft-access can easily go behind the applicatio, design the forms, delete edit/tables etc... There is...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
3
by: | last post by:
I've secured my Access database by creating an MDE file because it contains confidential data. However, I find that anyone can simply use Microsoft Access to link to or import the tables in that...
7
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
11
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
1
by: abdulrauf | last post by:
Hope someone can help. I am trying to build an application that will allow a user to access/deny an application, the application's individual pages, and the forms within the individual pages. ...
9
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1....
4
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.