473,386 Members | 1,819 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Setting network permissions for database

I want to put an Access database back end on a network server so that it
can be shared by several users. I plan to use the built-in Access security
to set permissions for the database but am concerned that someone could
delete the back end from the server. What I need to know is what sharing
permissions and security settings I need to apply to the back end and to
the folder it resides in.

Also, can I use the server settings to determine who can make changes to
the database based on the user's login name?

The server is Windows 2000 formated in NTFS.

Any help will be greatly appreciated.
Nov 13 '05 #1
1 1950
Bob Sanderson wrote:
I want to put an Access database back end on a network server so that
it can be shared by several users. I plan to use the built-in Access
security to set permissions for the database but am concerned that
someone could delete the back end from the server. What I need to
know is what sharing permissions and security settings I need to
apply to the back end and to the folder it resides in.

Also, can I use the server settings to determine who can make changes
to the database based on the user's login name?

The server is Windows 2000 formated in NTFS.

Any help will be greatly appreciated.


ALL users need file create, file delete, file read, and file modify to use
an Access MDB. This is true even for read-only access unless you want all
users to be read only. So yes, an authorized user can delete your mdb.

Split the app, give each user a front end that links to the shared back end,
and put the back end in a share that the users have full permissions to but
which is hidden. This will deter casual browsers. Then set up a good
backup routine.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Fran Tirimo | last post by:
I am developing a small website using ASP scripts to format data retrieved from an Access database. It will run on a Windows 2003 server supporting FrontPage extensions 2002 hosted by the company...
3
by: Stanley J, Mroczek | last post by:
My disk was replaced and i reload all my software. I think that i named my computer best-si-01 instead of BEST-SI-01 and thats my error? Login failed for user 'NT AUTHORITY\NETWORK SERVICE'....
10
by: MHenry | last post by:
Hi, We were going merrily along for 6 years using this database to record all client checks that came into our office, including information about what the checks were for. Suddenly, network...
2
by: KaHuNa | last post by:
this code works perfectly when i use it on the server where mySQL is installed, but i have a security error when i use it on a client computer. I don't know how i can change that. using...
2
by: Joey | last post by:
Hey, I need to change a Share's "Share Permissions" using .NET, and without using WMI, is it possible? Thanks ahead! --Joey
4
by: Scott Nicholson | last post by:
I've got a site set up that uses a network share as it's home directory. Simple stuff is working fine. When I try to put a database in there, though, I run into problems. I'm using: dim...
10
by: John Salerno | last post by:
I always read about how you need to set certain file permissions (for cgi files, for example), but it's never been clear to me *how* you do this. I know you can run the line chmod 755...
10
by: Sridhar | last post by:
HI, I am having problems setting up a website so that it will be available only inside the domain. We have three servers. One is iis server and second one is internal server and the third one is...
10
by: gary0gilbert | last post by:
An unusual spin to this recurring disk or network error in a Terminal Server environment. Access 2000, Terminal Server 2000, file server is windows 2000. All users have a separate copy of the...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.