473,385 Members | 2,044 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Security & Linking/Importing Tables in Access 2000

Hello,
I have a problem that I was hoping to get some assistance with. I
have built a split database (back end with all the tables and a
password to protect the information & a front end to link to it).

I have followed the Access Security model to create security over my
Front End database (create a new workgroup, remove the admin user from
the admins group, change permissions on the users group to very
limited access etc).

Here is my problem. I have linked all the tables in my front end
(with the password) & my security works fine within this database.
I have then created a new blank database & imported all of the tables
from the Front End. The import brings across all the valid links to
the back end & allows me to delete, append, add & update data although
i have disallowed most of these functions in the security model.

Does anyone have any suggestions on how I can fix my security issue &
stop people from accessing this security hole.

Thanks in advance.

patcho
Nov 13 '05 #1
3 1940
I had the same problem at work where there were just 2 user accounts, mine
and a gen user account. A nosey so and so took it upon himself to show how
clever he was and did what you described and left little clues for me to
show that he had been there.

I got round it by removing ALL permissions on all the tables in the backend
for the gen-user account.

Make sure you set the permissions on the backend and not the frontend as
they will still be able to import from the backend. You need to make sure
that you are the owner of all the tables too.

I left my account with full access to everything and sure that all the
queries in the FE are set to run with OwnerAccess Option. You do this by
opening the query in design view and go to the properties. From the list,
select owner's in run permissions. This means that people logged in as a
gen-user can't open the tables but can run the queries that read from them.

Mark
"patcho" <sp*******@fm.optus.net.au> wrote in message
news:71*************************@posting.google.co m...
Hello,
I have a problem that I was hoping to get some assistance with. I
have built a split database (back end with all the tables and a
password to protect the information & a front end to link to it).

I have followed the Access Security model to create security over my
Front End database (create a new workgroup, remove the admin user from
the admins group, change permissions on the users group to very
limited access etc).

Here is my problem. I have linked all the tables in my front end
(with the password) & my security works fine within this database.
I have then created a new blank database & imported all of the tables
from the Front End. The import brings across all the valid links to
the back end & allows me to delete, append, add & update data although
i have disallowed most of these functions in the security model.

Does anyone have any suggestions on how I can fix my security issue &
stop people from accessing this security hole.

Thanks in advance.

patcho

Nov 13 '05 #2
sp*******@fm.optus.net.au (patcho) wrote:
I have followed the Access Security model to create security over my
Front End database (create a new workgroup, remove the admin user from
the admins group, change permissions on the users group to very
limited access etc).


Hi.

There is a major difference between the "database password" and invoking
user-level security, so be sure you understand the difference :o)

As Mark has stated make sure that you deny access to the "Users" group for
all of your objects *including* the database object (this appears in the
drop down list above the default 'tables').

I would also recommend denying access to all tables for all but the admin
user and use queries set to run with owner access.

The step-by-step example on how to secure an app on my website might be
useful (there's all sorts of junk on there ;-), use the left-hand panel to
find Access).

HTH - Keith.
www.keithwilby.org.uk
Nov 13 '05 #3
Thank you very much to both Mark & Keith,

It looks like I was about 60% of the way there & just missed the crucial
parts :-)

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: John South | last post by:
I have an Access 2000 front end that I wish to work with a SQL Server 2000 database by means of Linked tables. Do I have to use an ODBC connection to SQL Server? It seems to be the only option...
5
by: Christoph Sticksel | last post by:
Hi, I'm having problems with attaching two tables stored in an SQL Server 2000 to an Access 97 database. It worked well for all other tables except those two. This is what I did: Choose the...
1
by: Paul | last post by:
Hello, I am converting an Access database on our network to a sql 2000 backend and keeping access as the front end. The access database has evolved and been a solution to collect data but now...
2
by: Sara | last post by:
Hi - I've been reading the posts for a solution to my query, and realize that I should ask an "approch" question as well. We receive our production data from a third party, so my uers import...
5
by: dixie | last post by:
If I sent a user an empty database container - dB with no tables and I needed them to import their tables into it and one of their tables was a hidden table with the prefix Usys, is there any way...
1
by: Andrew Chanter | last post by:
I have taken over support of an A97 application which has presented an interesting and confounding scenario involving workgroup security. I cant figure out whether my predecessor deliberately...
4
by: Smriti Dev | last post by:
Hi There, I'm creating a MS ACCESS database using Ms Access 2000 to store Interpretation requests by different departments in a hospital and Interpreter availability. All internal departments...
1
by: thadson | last post by:
Hi, I'm trying to import specific cells from MS Excel 2000 spreadsheets to MS Access 2000 tables then move the spreadsheets to a different directory. I'm very new to this and I'm having trouble...
3
by: ARC | last post by:
I'm having trouble here with Access 2007 and connecting to a different database. The code below works great IF the previous back-end database connection is still present and you are trying to...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.