473,473 Members | 1,902 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Securing a table without restricting form usage

Hi, I have a database that contains only one table. This table
contains highly confidential/unique information that, if viewed or
copied as a whole, would give away much of my company's intellectual
property. So, obviously we don't want users to have direct access to
view, modify, etc. this table. However, there is a form in this
database that uses data from that table to calculate averages, etc.
I'd like the form to have access to the table so that the calculations
can be performed, but again we don't want anybody looking at the
underlying table directly. When I use the User Security Wizard, I
can't seem to set it up this way. It seems like it's one extreme or
the other: either the table becomes unavailable to both the users AND
the form, or I make the table read-only so the form can use it -- but
the users can also view the data. Is there a way that I can make it so
that my form will run okay while making the table completely
invisible/unavailable to users?
Thanks for any suggestions.

Chris

Nov 13 '05 #1
5 1341
On 7 Dec 2004 14:36:41 -0800, "ronchito" <ro*******@yahoo.com> wrote:
Hi, I have a database that contains only one table. This table
contains highly confidential/unique information that, if viewed or
copied as a whole, would give away much of my company's intellectual
property. So, obviously we don't want users to have direct access to
view, modify, etc. this table. However, there is a form in this
database that uses data from that table to calculate averages, etc.
I'd like the form to have access to the table so that the calculations
can be performed, but again we don't want anybody looking at the
underlying table directly. When I use the User Security Wizard, I
can't seem to set it up this way. It seems like it's one extreme or
the other: either the table becomes unavailable to both the users AND
the form, or I make the table read-only so the form can use it -- but
the users can also view the data. Is there a way that I can make it so
that my form will run okay while making the table completely
invisible/unavailable to users?
Thanks for any suggestions.

Chris

Hi
Owner-access queries can provide this functionality.
(Or use a real database as a back-end and set up a view. :))
David

Nov 13 '05 #2
"ronchito" <ro*******@yahoo.com> wrote:
Hi, I have a database that contains only one table. This table
contains highly confidential/unique information that, if viewed or
copied as a whole, would give away much of my company's intellectual
property. So, obviously we don't want users to have direct access to
view, modify, etc. this table. However, there is a form in this
database that uses data from that table to calculate averages, etc.
I'd like the form to have access to the table so that the calculations
can be performed, but again we don't want anybody looking at the
underlying table directly. When I use the User Security Wizard, I
can't seem to set it up this way. It seems like it's one extreme or
the other: either the table becomes unavailable to both the users AND
the form, or I make the table read-only so the form can use it -- but
the users can also view the data. Is there a way that I can make it so
that my form will run okay while making the table completely
invisible/unavailable to users?
Thanks for any suggestions.

Chris


Hi Chris.

Access user-level security takes some learning and getting used to. You
need to create an 'ordinary user' account for restricted access and use the
Admin account for direct table access.

The 'ordinary user' could then access the data via an 'owner access' query
- this enables you to deny user access to the table object whilst still
allowing a certain level of data access.

But really there's no substitute for reading this

<http://support.microsoft.com/default...access%2fconte
nt%2fsecfaq.asp>

if you want to use user-level security.

There's also a step-by-step example on my web site.

Regards,
Keith.
www.keithwilby.com
Nov 13 '05 #3
"Keith Wilby" <ke*********@AwayWithYerCrap.com> wrote in message
news:Xn************************@10.15.188.42...
"ronchito" <ro*******@yahoo.com> wrote:
Access user-level security takes some learning and getting used to. You
need to create an 'ordinary user' account for restricted access and use the
Admin account for direct table access.[Snip]


Just to clarify. That last sentence should read "...and use an account with
Administrator privileges for direct table access." The specific account "Admin"
should not have any permissions at all in a properly secured app.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
"Rick Brandt" <ri*********@hotmail.com> wrote:
Access user-level security takes some learning and getting used to.
You need to create an 'ordinary user' account for restricted access
and use the Admin account for direct table access.[Snip]


Just to clarify. That last sentence should read "...and use an account
with Administrator privileges for direct table access." The specific
account "Admin" should not have any permissions at all in a properly
secured app.


Quite so, my apologies. I was referring to an account in the Admins group
but my attempts to simplify my posting got the better of me :-/
Nov 13 '05 #5
thanks guys -- i will research the sites you listed and check back if i
have any further questions. **much appreciated**

chris
Keith Wilby wrote:
"Rick Brandt" <ri*********@hotmail.com> wrote:
Access user-level security takes some learning and getting used to. You need to create an 'ordinary user' account for restricted access and use the Admin account for direct table access.[Snip]
Just to clarify. That last sentence should read "...and use an account with Administrator privileges for direct table access." The specific account "Admin" should not have any permissions at all in a properly secured app.


Quite so, my apologies. I was referring to an account in the Admins

group but my attempts to simplify my posting got the better of me :-/


Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

76
by: Nick Coghlan | last post by:
GvR has commented that he want to get rid of the lambda keyword for Python 3.0. Getting rid of lambda seems like a worthy goal, but I'd prefer to see it dropped in favour of a different syntax,...
5
by: Jeremy Langworthy | last post by:
Hi I have two "totals" inputs whose values are dynamically calculated. For obvious reasons I don't want users to be able to edit the information in these. However, I do want this total passed to...
25
by: kie | last post by:
hello, i have a table that creates and deletes rows dynamically using createElement, appendChild, removeChild. when i have added the required amount of rows and input my data, i would like to...
61
by: Toby Austin | last post by:
I'm trying to replace <table>s with <div>s as much as possible. However, I can't figure out how to do the following… <table> <tr> <td valign="top" width="100%">some data that will...
2
by: byrocat | last post by:
I'm chasing after a documetn that was available on one of the Microsoft websites that was titled somethign like "MS SQL Server Best Practices" and detailed a nyumber of best practices about...
1
by: penguin732901 | last post by:
I have never had a need to use Access' built in security. Now a client has requested that one particular table be available only to a specific user. (It happens to be information that's really...
117
by: phil-news-nospam | last post by:
Is there really any advantage to using DIV elements with float style properies, vs. the old method of TABLE and TR and TD? I'm finding that by using DIV, it still involves the same number of...
9
by: Kelii | last post by:
I've been trying to get this piece to work for a few hours, but have given up. I hope someone out there can help, I think the issue is relatively straightforward, but being a novice, I'm stumped....
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
1
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.