473,405 Members | 2,354 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Workgroup file at the database level

I am new to securing a database with logins. My questions is: I want
only one database to use a new Workgroup file that I have created, not
all the Access databases that I bring up under my system login. Can
this be done?

Thanks

Nov 13 '05 #1
1 2506
raydelex wrote:
I am new to securing a database with logins. My questions is: I want
only one database to use a new Workgroup file that I have created, not
all the Access databases that I bring up under my system login. Can
this be done?

Thanks


It is important to understand how Access User-Level security works. The
security "environment" is established when Access itself is launched.
Absolutely no MDB or MDE file is involved at this stage.

Point 1)
Access ALWAYS uses a workgroup file when opened. It either uses the user's
default workgroup or it uses the one specified as a command line argument. This
point gets to your original question. More on this below.

Point 2)
The workgroup file being used when Access opens either has a password applied to
the default user "Admin" or it doesn't. If it does, you are prompted to login.
If it does not then you are not prompted. Again the file or files that you
might want to open haven't entered the picture yet. So if you have made your
default workgroup one that has a password on the Admin user then you are always
prompted to login when you open Access. To avoid this leave your default
workgroup as System.mdw and use a command line argument to specify a different
workgroup only when you need to open a secured file. Most people do this by
creating a shortcut with a Target similar to...

"Path to MSAccess.exe" /wrkgrp "Path to MDW" "Path to MDB"

Point 3)
Once you have Access opened you are now in a "security environment" for that
session. In the context of that session Access now knows who you are and what
groups you belong to in the workgroup file that is being used. If you were not
prompted for a login then you are automatically the user "Admin" who is a member
of the group "Users". You are also "sometimes" a member of the group Admins.
The distinction here is that the group Users is identical in all workgroup
files. This is not true of the group Admins.

You could take 1000 System.MDW files that were created by Microsoft and they
would internally have the same PID for the Admins group. Any user created
workgroup file will always have a different PID. So, when you open a secured
MDB with the default System.MDW you will be a member of the group Admins in that
workgroup, but the file you're opening will not recognize that group as the
*correct* Admins group because the PID is wrong.

Point 4)
Each Access file contains data about what users and what accounts are allowed to
do stuff. The most important being what Users/Groups are allowed to open the
file at all. It doesn't care what workgroup file is being used. It only cares
that the User/Group attempting to do something is one that has permissions to do
so.

Point 5)
Now...we actually attempt to open a particular file. The Access session has the
information about who the current User is and what Groups he belongs to. This
is compared to the information in the file being opened to see if adequate
permissions exist. If they do the file is opened. If not then an error is
raised and the file doesn't open.

Point 6)
What is an "unsecured file"? Basically a file is unsecured if the default user
Admin has full permissions to it or the default group Users has full permissions
to it. Such a file doesn't care what User attempts to open the file as ALL
users are members of the default group Users. This is true of all workgroup
files. You cannot create a user account that is not a member of the default
group Users and the group Users is identified exactly the same in every
workgroup file.

I know the above is rather verbose, but the main point is that User-Level
security is not "attached" to a particular file in the sense that a simple file
password is. You run Access in an environment that is determined by your
workgroup and that environment will let you open some files and not others.
There is no marriage between the MDW and the MDB since any MDW can be used to
open an indefinite number of MDBs and any MDB can be opened by an indefinite
number of MDWs.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com



Nov 13 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Neil Sargent | last post by:
I have a generic code library, developed as an MDA and distributed as an MDE. It is developed using my system workgroup file. I have a number of applications which use the code library. One of...
7
by: Newbillian | last post by:
Is there some way of using vba to automate the processe of joining an Access 97 security workgroup? I typed wrkgadm /? at a command prompt and it just opens the gui, so I'm not sure what the...
4
by: Chris Tyson | last post by:
My problem is this: I have created a database, using Workgroup security features. Unique Workgroup. New users added. Permissions to Admins, Admin, and Users revoked. 'Ownership' of database...
3
by: Larry R Harrison Jr | last post by:
I have an Access 97 secured database which I designed myself. I have the workgroup file and I have been both been trying to access it using a custom shortcut--which I updated to reflect the current...
1
by: paulsmith5 | last post by:
Hi, I secured a database a while back using the User-Level Security Wizard. During this process I created a new workgroup file, modified the Admins group by adding a new administrator and...
3
by: JaBo | last post by:
Our company computers were recently upgraded to Windows XP with Microsoft Office 2003. We have 3 different Access Databases (in different directories on our network) which all require the user to...
1
by: Angelo | last post by:
I recently created a workgroup for an access database and it works fine. But I have other versions of that same database (beta copies) for which I didn't create that workgroup file. They have...
3
by: gazelle04 | last post by:
Can I connect to a workgroup information file (MDW) thru code? I have a user level secured database and I want to automatically connect to the mdw file once I double clicked the database. Is it...
7
by: michmcgrath | last post by:
The format is 2000, created using 2002, it is still in development. There is a workgroup file that determines permissions, users login The workgroup and database are located on a network where...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.