473,386 Members | 1,754 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Database Security

Ant


I am trying to apply security to a database I have just finished. The
application is split into a back end of tables and a front end of forms etc.
I need some users to have access to forms based on some queries but not
others. My question is do I run the security wizard in the back end DB or
the front end? If I just do the front end I seem to have more control
(Queries, individual forms etc) but what’s to stop some one just opening the
back end DB. If I run the security wizard on the back end I can block
access to tables but not queries or forms. If I ran it in both I feel both
me and Access would get confused

As you can probably guess it’s the first time I have applied security levels
in a DB but I need to get it right first time. Thanks for any suggestions

Nov 13 '05 #1
4 1709
The point is you want to secure the application, so you must secure both
front and backends. Access won't get confused...

Some tips on Access security I put together for my Blog in May follow.
--

Tony D'Ambra
Web Site: aadconsulting.com
Web Blog: accessextra.net

Effective MS Access Security?

Did you know that:

1. You can access the Start-Up properties (such as disabling the Shift key
bypass) of an .mde through an .mdb and change each property

2. You can open an .mde with the Shift key, press Ctrl+G to open the Debug
window, press F2 to open the Object Browser, and then search all the code
modules and constants.

3. You can import all the form and report objects but not the code from an
unsecured .mde into an .mdb.

To effectively secure an Access database you MUST demote the Admin user from
the Admins group. Otherwise your database will not be secure, as Admin
cannot be removed from the Users group, and anyone using the retail
system.mdw file logs on automatically as Admin.

Securing An Access Database

1. Use the Access Workgroup Administrator (AWA), wrkgadm.exe, to create a
new workgroup (.mdw) file.

2. Join the new workgroup using the AWA.

3. Open Access and the database to be secured.

4. Using Tools, Security, User and Group Accounts..., in the User and Group
Accounts dialog:

4.1 Create a password for Admin user.

4.2 Create a new user account. This account will be the new database owner
account. For example, call the owner account DBOwner. Add "DBOwner" to all
groups, including the critical Admins group.

5. Close and re-open Access, logging on as "DbOwner", and leaving the
password blank, as you have not assigned one yet.

7. In the User and Group Accounts dialog, demote the Admin user account by
removing it from the Admins group. Now Admin is only a member of the Users
group and will have only those permissions assigned to that group by
"DBOwner".

8. Create a password for "DBOwner".

9. Close and re-open Access, logging on as "DBOwner" using the password you
created in step 8.

10. You can now start to secure the objects in you database.

Special Notes:

* A User account inherits the permissions of the Group to which it belongs.

* In Access 2000 and later, if you are not creating an .mde, you also need
to secure your code by using Password Protection in the VBA Editor.
"Ant" <an*******@virgin.net> wrote in message
news:C1*****************@newsfe1-win.ntli.net...


I am trying to apply security to a database I have just finished. The
application is split into a back end of tables and a front end of forms
etc.
I need some users to have access to forms based on some queries but not
others. My question is do I run the security wizard in the back end DB or
the front end? If I just do the front end I seem to have more control
(Queries, individual forms etc) but what’s to stop some one just opening
the
back end DB. If I run the security wizard on the back end I can block
access to tables but not queries or forms. If I ran it in both I feel
both
me and Access would get confused

As you can probably guess it’s the first time I have applied security
levels
in a DB but I need to get it right first time. Thanks for any suggestions

Nov 13 '05 #2
I'm new to Access security and have a couple of questions if anyone can
help. From what I've read, after a database is secured, the Access
application itself has to be logged on to. Does this effect other
databases on the same machine?

How does security work in a shared network environment? Is the .mdw
file shared on the network?

Nov 13 '05 #3
On 5 Jan 2005 16:17:17 -0800, "Wayne" <cq*******@volcanomail.com>
wrote:
I'm new to Access security and have a couple of questions if anyone can
help. From what I've read, after a database is secured, the Access
application itself has to be logged on to. Does this effect other
databases on the same machine?
If you change the default workgroup for Access (which the wizard
*does*), then yes, other databases are affected. If, on the other
hand, you properly customize a shortcut to log onto a workgroup and
launch your database, then other databases are not affected.

How does security work in a shared network environment? Is the .mdw Very well...
file shared on the network?

Proper location is on a network share where all users have full
read-write permission.

See the website in my signature for several good explanations.

**********************
ja**************@telusTELUS.net
remove uppercase letters for true email
http://www.geocities.com/jacksonmacd/ for info on MS Access security
Nov 13 '05 #4
Thanks for the info Jack.

Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Steve | last post by:
I am planning on deploying a fairly unsophisticated web application using ASP. The app will read a user's record from an Access database stored on the web server (the database file will not be...
0
by: valexena | last post by:
What are two components of the Oracle database security model? -- Posted via http://dbforums.com
5
by: Paul .V. | last post by:
I have read many long articles in this group about securing my database for distribution. This is the advise I have taken: 1. Hardcoded the purchasing company's name into the program. The...
4
by: Pecanfan | last post by:
I've got quite a large database which is totally form-driven at the moment. I now need to allow multiple users access to various parts of it and, frankly, I'm not prepared waste my time with...
1
by: Hot Tracker | last post by:
Looking for a consultant with solid experience in application and database security for a project in the GTA. CONTACT --------------------------------------------------- Please send your resume...
29
by: Martin | last post by:
Sorry, the prior message was multi-posted. Here's a cross-posted version. Please disregard the other one. Is there a way to create and encrypted database file? What do people do when data...
5
by: isideveloper | last post by:
I'm building a new C# web application that will provide my company some administrative operations that were previously only completed by tweaking the data in the database. 1. Encrypted password...
1
by: Prasu TKP | last post by:
I have developed an Access Application and given to the pople to work through 'Share folder'. There are six people using every day. I have disabled the byepass key also. Very recently one peson...
0
by: gerryis2000 | last post by:
Hi, i used the security wizard to set security on a adatabase. when i copied it to another computer, the database refused to open though i had copied all the security file, backup file and the...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.