473,405 Members | 2,279 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Splitting/MDE's/Security

Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on the
local install directory, and use the command line parameters of the shortcut
to point the database file to this file, when starting up.

I want to keep my installations separate from other access databases on the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Can the back end inherit the security using the the splitter, even across
the Lan.
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'

Thanks in advance.

Gerry Abbott


--

Nov 13 '05 #1
3 1376
Still hoping that someone will answer my post.

I have looked at old threads and found a very userful one, which clarifies
where the MDW files should be placed in a multi-user environment, and it
touches on the need to assign permissions to the table links, of a linked
file. But my questions below remain unanswered.

http://groups.google.com/groups?hl=e...nbbsa03#link10


Gerry Abbott
"Gerry Abbott" <pl****@ask.ie> wrote in message
news:oI*******************@news.indigo.ie...
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on
the local install directory, and use the command line parameters of the
shortcut to point the database file to this file, when starting up.

I want to keep my installations separate from other access databases on
the client's machines, that;s why i'm using the command line to link with
the mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Can the back end inherit the security using the the splitter, even across
the Lan.
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'

Thanks in advance.

Gerry Abbott


--

Nov 13 '05 #2
On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.ie>
wrote:
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on the
local install directory, and use the command line parameters of the shortcut
to point the database file to this file, when starting up.
A shared MDW is easier to maintain instead of a multitude of MDW's on
the local machines. (if that is what you meant...)

Using the shortcut to specify the MDW is the correct way to do it.

I want to keep my installations separate from other access databases on the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.
Do it manually.

Can the back end inherit the security using the the splitter, even across
the Lan.
LAN is irrelevant. Apparently the splitter fails to properly apply
security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'
Each Access session is controlled by an MDW. The backend will use the
accounts from whatever MDW was used to launch Access. Matters not
whether you open Access, then open the FE or open Access, then open
the BE. In both cases, the MDW that you used to launch Access controls
the permissions on the BE.

Check the paper on the website in my signature for additional
information.

Thanks in advance.

Gerry Abbott

**********************
ja**************@telusTELUS.net
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security
Nov 13 '05 #3
Thanks Jack,

Nice paper, great help.

Regards,
Gerry Abbott

"Jack MacDonald" <ja**************@telus.net> wrote in message
news:uv********************************@4ax.com...
On Wed, 29 Sep 2004 20:05:55 +0100, "Gerry Abbott" <pl****@ask.ie>
wrote:
Hi all.
I've been getting my head around user-level security, and pretty much have
the hang of how to give defined access to different users. However I
normally implement using and MDE for the FE,on a local machine and an MDB
for the backend on a server drive. I intend to have a local mdw file on
the
local install directory, and use the command line parameters of the
shortcut
to point the database file to this file, when starting up.


A shared MDW is easier to maintain instead of a multitude of MDW's on
the local machines. (if that is what you meant...)

Using the shortcut to specify the MDW is the correct way to do it.

I want to keep my installations separate from other access databases on
the
client's machines, that;s why i'm using the command line to link with the
mdw file.

There are two ways for me to create the backend file, either copy the full
file, and remove all except the tables, then remove all the tables in the
front end, and link them from he backend. Or , use the database splitter.

Couple of questions for someone with experience of this.
Which one is going to be best to maintain the security.


Do it manually.

Can the back end inherit the security using the the splitter, even across
the Lan.


LAN is irrelevant. Apparently the splitter fails to properly apply
security to the BE (no personal experience -- I always do it manually)
If not, then how do I get the backend to refer to the local mdw file, or
does this remain fixed for the access 'session'


Each Access session is controlled by an MDW. The backend will use the
accounts from whatever MDW was used to launch Access. Matters not
whether you open Access, then open the FE or open Access, then open
the BE. In both cases, the MDW that you used to launch Access controls
the permissions on the BE.

Check the paper on the website in my signature for additional
information.

Thanks in advance.

Gerry Abbott

**********************
ja**************@telusTELUS.net
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security

Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Jay McGrath | last post by:
Does anyone know if it is possible to prevent a user from accessing the tables in an MDE file? I can go to my start-up menu and limit access to various functions, etc. I could even disable the...
7
by: Norm | last post by:
Hi All, I have an MDB file which I want to remain secure. It checks for certain parameters upon startup, and will automatically exit if the program is opened/executed by an unauthorized user. ...
3
by: Gerry Abbott | last post by:
I have ODE 2000, as well as other versions of Office. Currently i install and split solutions into mde Fe and mdb Be files at clients site. Then for updates (which exclude changes to the data) i...
3
by: Tim Marshall | last post by:
My A2003 is set up so that the default file format is Access 2000 (options, advanced tab). I've just tried to make my first A2003 mdb into an mde and I get an error saying: "you cannot create a...
1
by: Ron Nolan | last post by:
I am building an application using Access 2002. It will consist of two .mdb's, one for the data tables only and the other will be for the forms, queries, reports, macros, & modules only. I know...
4
by: Jay Mack | last post by:
Hello, I converted an Access application that used to have a MDE front-end (distributed to each user) with a MDB back-end on a share. It now has a MDE front-end with linked ODBC SQL Server 2000...
2
by: support | last post by:
We are starting to implement security in an Access DB (Access 2000 and 2003 front ends, SQL 2005 back end via DSN). The problem (or maybe not??) is that when I tried to create an MDE file, it...
2
by: larpup | last post by:
When running on A2003 runtime with an mde i receive 3 security warnings. Do you want to block unsafe expresssions. Then another security warning Then, do you want to open this file. This...
4
by: Chris | last post by:
How do we create digitally signed MDE files in Access 2007 ? I tried to follow the procedure I was using in other office versions. 1. I installed the Verisign certificate (with private key)....
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.