473,387 Members | 1,510 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Strange problem with secured database--Urgent HELP Needed

Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access.
So let the access application be xxx.mdb. After completing the whole
development for xxx.mdb, i secured it using the procedure defined in
the FAQ and created the Workgroup information file for it, say
xxx_WIF.mdw. I tested it for my satisfaction and everything was
working exactly the way it is supposed to.
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database.
Then i again tested on my beta machine and 4 other machines and quite
surprisingly it works fine on 3 machines i.e. I am not able to acess
the application without using xxx_WIF.mdw but on other two machines,
the user is able to open it using the default windows WIF
(system.mdw). (All machines use MS Access 2002 with SP3 installed)
I tried many methods to observe the reason for this behavouri but was
unsuccesfull and now have to turn to the community for SOS. Any inputs
from the community will be highly appreciated and is needed urgently
as the application is scheduled to be deployed into a couple of days.
Thanks,
Nitin

Peace :)
Nov 13 '05 #1
4 1370
"xunitinmullik" <ni**********@yahoo.com> wrote in message
news:da**************************@posting.google.c om...
Hello ppl:
I am facing a problem that I ahve never experienced before with the
secured database. I created an MS Access 2000 application (.mdb) using
MS Access 2002 and secured it using exactly the procedure described in
the Access Security FAQ and as I have been doing since the time I
have started using Access. [SNIP]
Now the problem I am facing is, that when the project went into QA
phase, the QA team observed that on the machines that the application
was installed for testing, the users were able to open and use the
application without using its defined workgroup information file
(xxx_WIF.mdw) and the default WIF of windows worked for them to open
the database. [SNIP]


When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
"Rick Brandt" <ri*********@hotmail.com> wrote in message news:<2n************@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. Default "Admin" also
has been stripped of all the rights with no permissions assigned to
"Users' group too. But then anything being wrong with that is a
secondary issue. The main issue that I am facing is that the
application is getting opened by a WIF that was not used to secure it.
Any further inputs to rectify the problem will be appreciated.
Thanks in advance.

Nitin

Peace
Nov 13 '05 #3
"xunitinmullik" <ni**********@yahoo.com> wrote in message
news:da**************************@posting.google.c om...
"Rick Brandt" <ri*********@hotmail.com> wrote in message

news:<2n************@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
"Rick Brandt" <ri*********@hotmail.com> wrote in message news:<2n************@uni-berlin.de>...
"xunitinmullik" <ni**********@yahoo.com> wrote in message
news:da**************************@posting.google.c om...
"Rick Brandt" <ri*********@hotmail.com> wrote in message

news:<2n************@uni-berlin.de>...
When you go into Tools - Security who does it show is the owner of the
database?

There is simply no getting around the fact that when you open an mdb using
a workgroup file that does not ask you to log in, then you are then logged
in as "Admin" who is a member of "Users". A properly secured file cannot
be opened with such an account. It is a mystery why only "some" machines
are allowed to open it without logging in, but I have to believe that you
missed a step in setting up security.


Thanks for your inputs and time Rick.
The owner of all the objects is a user who is the member of Admins
group and i created to administer the project. [snip]


Just to be completely clear, when you say "all objects" you mean the database
object as well, correct? This is an oft missed step when setting up security.

Yes Rick, the database as well. This is the most disturbing point.
Everything seems to be in place, though i am sure that there is
something wrong somewhere that is causing the behaviour. Any other
things that i should consider? Guess, will have to implement it again
from start on the backup file if the issue doesn't resolves soon.
Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Richard Kuhns | last post by:
I can't iterate over os.environ, while a 'hand-made' dictionary works. It works fine with python 2.2.3 under FreeBSD 4.8. I looked through the release notes but didn't find anything I thought...
4
by: Julien Sagnard | last post by:
Hi all, When passing a list as default argument for a function, only one list is created for all calls. exemple: >>> def f(a=): .... a.append("x") .... print a .... >>> f()
1
by: Jim Hubbard | last post by:
I want to implement the same type of activeX restrictions in my browser application that the new SP2 for XP places in Internet Explorer. I have found 2 web pages dealing with this functionality...
3
by: Jason | last post by:
I have two applications that I wrote that use asp and javascript source files. Recently both of these applications starting acting strange on my test box. Image icons will randomly stop showing...
2
by: stabbert | last post by:
Can anyone confirm that the privelges needed to do an IMPORT with REPLACE have changed from 7.x to 8.x in DB2 UDB? I am finding the following definition in the online books for version 8 of DB2. ...
1
by: jedi | last post by:
I have newly acquired Ms Access 2003 after working for a number of years with Access 97. In that edition I used VBA quite extensively for updating recordsets under DAO protocols. Now I find that...
0
by: harrylmh | last post by:
Hi, I found something strange about the mouse's X,Y coordinates. Here's a program I made for testing. Start by moving your mouse over the Label on the left, then...move your mouse slowly from left...
1
by: pcard | last post by:
Hello, I ran the User-Level Security Wizard to try to secure an Access database that I created. But after I finished the steps, saved the report that contains all the important user/group info, and...
2
by: korean44 | last post by:
A beginner in C# .. I wrote 2 classes like below.. (psuedo code) public class FormUI : System.Windows.Forms.Form { public TextBox tbResult = new TextBox(); ...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.