473,385 Members | 1,769 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Usernames, Passwords, and User Levels

I'm Creating a database in access which needs different levels of
users. The highest being allowed to see and access everything,
including code, like admin. The next being allowed to see and use
everything except the code, high level users. and finally some users
who are only able to see and write to certain things.

Would i be best to use access's own security system, remembering that
there will be a huge amount of users, possibly near the 500 mark? Or
would i be better off using my own form which check's the username
against a password in a table, and if so how would i do this?

Also if i was using the latter method, using my own tables, would i
have to store the username and level in a global variable for the time
they are logged into the database, to allow them access to certain
parts of it, if so how is this done?

Cheers teddyparnell

Nov 13 '05 #1
2 1695
Use Acces' user-security. Read the Security FAQ

http://support.microsoft.com/default...b;en-us;207793

--
MGFoster:::mgf00 <at> earthlink <decimal-point> net
Oakland, CA (USA)

te**********@hotmail.com wrote:
I'm Creating a database in access which needs different levels of
users. The highest being allowed to see and access everything,
including code, like admin. The next being allowed to see and use
everything except the code, high level users. and finally some users
who are only able to see and write to certain things.

Would i be best to use access's own security system, remembering that
there will be a huge amount of users, possibly near the 500 mark? Or
would i be better off using my own form which check's the username
against a password in a table, and if so how would i do this?

Also if i was using the latter method, using my own tables, would i
have to store the username and level in a global variable for the time
they are logged into the database, to allow them access to certain
parts of it, if so how is this done?

Cheers teddyparnell

Nov 13 '05 #2
<te**********@hotmail.com> wrote in message
news:11*********************@g14g2000cwa.googlegro ups.com...
I'm Creating a database in access which needs different levels of
users. The highest being allowed to see and access everything,
including code, like admin. The next being allowed to see and use
everything except the code, high level users. and finally some users
who are only able to see and write to certain things.

Would i be best to use access's own security system, remembering that
there will be a huge amount of users, possibly near the 500 mark? Or
would i be better off using my own form which check's the username
against a password in a table, and if so how would i do this?

Also if i was using the latter method, using my own tables, would i
have to store the username and level in a global variable for the time
they are logged into the database, to allow them access to certain
parts of it, if so how is this done?

Cheers teddyparnell


500 users? Concurrent users? This is way past even the theoretical limit
for Access, or is the back-end data not stored in an mdb format? Perhaps
you could give us a few more details about how you access the data - is it
via lan, wan or internet? Standard Access applications which use the only
the Jet database engine might support 10, 15, 20 concurrent users - perhaps
more, but by this point you should be considering migrating the data to a
more robust format.
As to security, you should know that Access security is fundementally flawed
(there are public cracks available) and using your own security is only
meaningful if the tables have been properly secured - and this is impossible
with Access.
Nov 13 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: Florian Lindner | last post by:
Hello, I've a scripts that allows limited manipulation of a database to users. This script of course needs to save a password for the database connection. The users, on the other hand need read...
2
by: Peter Rilling | last post by:
How does Windows store passwords that it uses? For instance, when you install a service, you can provide it the username and password. This information is stored somehow so that at a later date...
15
by: Dino Vliet | last post by:
Hi folks, probably this is a question you've heard so many times but I wasn't able to find a solution to it. I'm using a shell script to create a textfile for me. It looks like...
2
by: marc.wyburn | last post by:
I'm writing a web app that needs a login page. I'm doing the dev on a windows box although the final version will go on a Linux box. I can't find any versions of mod_auth_Mysql precompiled for...
2
by: ketz | last post by:
How do i create a user login for a excel spreadsheet through a userform. I've seem to be able to get a password working but that only lets one passwrod in and its only the password. Ideally what i'd...
19
by: Cord-Heinrich Pahlmann | last post by:
Hi, I have written a tool wich de/encrypts a few of my forum and bloggin-Passwords. My question is how secure it is. The following describes how I have encrypted my passwords. When I log in,...
2
by: Simon.Whiteside | last post by:
If someone has created a database for me and transferred it over is there any way that I can check I have full access to all areas? I am a beginner with Access and so the development has been...
2
by: moondog | last post by:
The ftp site I want to attach to requires two logins. You need to enter your username and password, and then enter another username and password to get in. The FtpWebRequest object only allows...
0
by: Charles Teel | last post by:
I appologize in advance if this has been asked before. If it has, I have had zero luck trying to find it. Is there a way to restrict usernames in an SQLMembershipProvider so that they are only...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.