473,402 Members | 2,055 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,402 software developers and data experts.

Access Security Questions

I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the PC
itself? That is to say, will the security ask for a user name when
the database is opened, or does it do something with who is signed on
to the PC when the database is opened?

Thanks for the assistance

Nov 13 '05 #1
3 1505
"mar10" <ma****@yahoo.com> wrote in message
news:11**********************@g44g2000cwa.googlegr oups.com...
I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the PC
itself? That is to say, will the security ask for a user name when
the database is opened, or does it do something with who is signed on
to the PC when the database is opened?


Access user level security prompts for login when you open the file.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
Br
Rick Brandt <ri*********@hotmail.com> wrote:
"mar10" <ma****@yahoo.com> wrote in message
news:11**********************@g44g2000cwa.googlegr oups.com...
I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the
PC itself? That is to say, will the security ask for a user name
when the database is opened, or does it do something with who is
signed on to the PC when the database is opened?


Access user level security prompts for login when you open the file.


If you're using Access97 or previous Access will prompt you when Access
is opened.
If you're using Access2000 or later Access will prompt you when you open
a database.
....when attached to a non default workgroup file.

Access JET security can't use WindowsNT security. If you use MSSQL or
similar as the backend then you can take advantage of it.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #3
If you're using Access97 or previous Access will prompt you when Access
is opened.
If you're using Access2000 or later Access will prompt you when you open
a database.
...when attached to a non default workgroup file.

Never seen any difference in this respect between A97 and A2k.
If I open A2k with the default workgroup and try to open a secured mdb (using a different workgroup) Access tells me that I don't have the necessary permissions .....
Same with A97 here ...
Same with Access 2.0

If I am 'attached to' or 'using' a different mdw (or mda in previous versions) Access *always* prompts me.
This is just the way the security 'works'.
IME you can even open all your secured mdb's with the same login using different mdw-files for the mdb's.
This, of course, implies that you have created the *same* user with the *same* pid in the different mdw-files ...

Arno R
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Wayne Aprato | last post by:
Does anyone know where I can find a straightforward explanation of Access security? From what I have been able to understand from the small amount that I've read on security, it starts with...
3
by: Vic | last post by:
Dear All, I have been developing a small access database, but I am new to security concepts with access. This is a multiuser database, I have a table which will be written by various users...
16
by: Rob Geraghty | last post by:
I've just spent some time looking through FAQ sites and searching the google archives of this newsgroup, but I still haven't been able to find a clear explanation of an issue with multi-user...
2
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a...
3
by: Rachel | last post by:
Hi, I am using the data access application block successfully in our development environment, however when I deploy to our testing server as Private Assemblies I keep getting the following ...
1
by: Jody Gelowitz | last post by:
We are having an issue in that when trying to read a file that is on Server2 from Server1 (through our ASP.NET project), we receive the error: Access to the path "\\Server2\MyShare\MyFile.tif" is...
17
by: Mell via AccessMonster.com | last post by:
Is there a way to find out where an application was created from? i.e. - work or home i.e. - if application sits on a (work) server/network, the IT people know the application is sitting...
7
by: Visitor No 3 | last post by:
My local Crinkles group(U3A), of which I am one, want me to develop a noddy database and web site for their members. Some are computer literate, others not so. I thought an Access 2000 .mdb on a...
3
by: Earl Anderson | last post by:
One of the users in our departmental db has Read/Write permissions to a particular form. He was able to access and edit the form at will until 2 weeks ago. His current problem was that he was not...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.