473,378 Members | 1,138 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Looking for suggestion of database security implementation

Hello !

I am distributing one application using MS Access. As for its security,
I am thinking this way:

1. For end-users, they can interact with the application throght the
custom menu items provided. They have no access to the tables directly.

2. A developer can have have full access to its tables for setting,
correcting data.
Questions:

1. Do I have to use a user-login system ? If yes, can I set an end-user
to login without a password ?

2. From Q1, I suppose that as a developer I have to furnish a password
to access the tables !?
Thanks for any suggestion.

Nov 13 '05 #1
1 1287
cnlai <cn***@pc.jaring.my> wrote:
Questions:

1. Do I have to use a user-login system ? If yes, can I set an end-user
to login without a password ?
The built-in user-level security will require a user name to be supplied
but the password can be blank. User name and password can be supplied as
command line switches.

2. From Q1, I suppose that as a developer I have to furnish a password
to access the tables !?


No, any password can be left blank (with obvious implications).

I thoroughly recommend that you read the MS KB article on security:

<http://support.microsoft.com/default...access%2fconte
nt%2fsecfaq.asp>

There's also a step-by-step example on my web site. Always work on a copy
of your files.

Regards,
Keith.
www.keithwilby.com
Nov 13 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: Master of C++ | last post by:
Hello Folks, I have a programming dilemma with templates and "genericity". I can think of a few solutions, but I am not sure which one is the best in terms of genetic C++ style. Any suggestions...
10
by: ibm_97 | last post by:
Hi, all I'm new to DB2 world. DB2 8.1 enterprise on Win XP. Installation (typical method) is fine. I log in as 'abc' user (admin user) to do the installation. Now I have 'db2admin' user. ...
29
by: Martin | last post by:
Sorry, the prior message was multi-posted. Here's a cross-posted version. Please disregard the other one. Is there a way to create and encrypted database file? What do people do when data...
4
by: B | last post by:
Hi, I'm working on a site where the user must log in before they see the home page. When the user logs in, I retrieve their role from the database, store it in a Session object and redirect...
13
by: Alan Silver | last post by:
Hello, MSDN (amongst other places) is full of helpful advice on ways to do data access, but they all seem geared to wards enterprise applications. Maybe I'm in a minority, but I don't have those...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.