473,382 Members | 1,464 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

Login Security Question

Hi All,

I have never tried to restrict what a person has access (Not Intended As A Joke) to. But my current class assignment requires that I present specialized switchboards to users based upon their credentials. The switchboards are not the problem - creating users, groups, etc. is. And then to deploy this system after they first log in, I expect, is another matter altogether.

For example, the den leader would need the ability to monitor everything in the database, including setting up the troop in the first place. He also creates users and groups, and is in charge of passwords. Then he creates users who perform various tasks within the troop.

For example, one of the cub scouts takes role at each meeting, and should only gain access to forms and reports pertaining to attendance.

Another boy takes care of recording whether they earned a particular badge, and then making sure someone orders it, and eventually pins it on who earned it.

This feels typical to the things most of you professionals do every day. And though mine is a labor of love, it still covers the same ground you have already covered. As a consequence, I would be overwhelmingly grateful if someone has already developed something along these lines would zip up the whole thing and send it to me.

Thanks a 1,000,000
Chuck
Nov 13 '05 #1
8 2007
Br
Chuck Insight <j.*******@insightbb.com> wrote:
Hi All,

I have never tried to restrict what a person has access (Not Intended
As A Joke) to. But my current class assignment requires that I
present specialized switchboards to users based upon their
credentials. The switchboards are not the problem - creating users,
groups, etc. is. And then to deploy this system after they first log
in, I expect, is another matter altogether.

For example, the den leader would need the ability to monitor
everything in the database, including setting up the troop in the
first place. He also creates users and groups, and is in charge of
passwords. Then he creates users who perform various tasks within the
troop.

For example, one of the cub scouts takes role at each meeting, and
should only gain access to forms and reports pertaining to
attendance.

Another boy takes care of recording whether they earned a particular
badge, and then making sure someone orders it, and eventually pins it
on who earned it.

This feels typical to the things most of you professionals do every
day. And though mine is a labor of love, it still covers the same
ground you have already covered. As a consequence, I would be
overwhelmingly grateful if someone has already developed something
along these lines would zip up the whole thing and send it to me.

Thanks a 1,000,000
Chuck


Do your own homework! :) It's all on the Net and the Access help file
already.

Lookup MS's whitepaper on how to set up security then look at the
CurrentUser() function.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #2
This is a very tall order for sure, but very do-able using User Level Security.
If you have never used ULS you must, not an option, read a lot of material
on the subject. It can be a difficult concept to grasp the first couple of
times. Practice on dummy databases until you really have a feel for it.

Having someone send you a working example will do you a disservice
on this subject. You must understand what is going on behind the scenes
with ULS, otherwise you will most likely screw things up. Not to mention
you will not have an answer when the instructor asks,
"Explain to me how you set this part up..."

Read all of the ULS information I have accumulated here on my site
(yes, read it ALL):

http://home.bendbroadband.com/conrad....html#Security

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

"Chuck Insight" wrote in message:
news:tg2ue.90644$xm3.8631@attbi_s21...

Hi All,

I have never tried to restrict what a person has access (Not Intended As A Joke) to. But my current
class assignment requires that I present specialized switchboards to users based upon their
credentials. The switchboards are not the problem - creating users, groups, etc. is. And then to
deploy this system after they first log in, I expect, is another matter altogether.

For example, the den leader would need the ability to monitor everything in the database, including
setting up the troop in the first place. He also creates users and groups, and is in charge of
passwords. Then he creates users who perform various tasks within the troop.

For example, one of the cub scouts takes role at each meeting, and should only gain access to forms
and reports pertaining to attendance.

Another boy takes care of recording whether they earned a particular badge, and then making sure
someone orders it, and eventually pins it on who earned it.

This feels typical to the things most of you professionals do every day. And though mine is a labor
of love, it still covers the same ground you have already covered. As a consequence, I would be
overwhelmingly grateful if someone has already developed something along these lines would zip up
the whole thing and send it to me.

Thanks a 1,000,000
Chuck

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #3
Br
Jeff Conrad <je***@ernstbrothers.com> wrote:
This is a very tall order for sure, but very do-able using User Level
Security. If you have never used ULS you must, not an option, read a
lot of material
on the subject. It can be a difficult concept to grasp the first
couple of times. Practice on dummy databases until you really have a
feel for it.

Having someone send you a working example will do you a disservice
on this subject. You must understand what is going on behind the
scenes
with ULS, otherwise you will most likely screw things up. Not to
mention
you will not have an answer when the instructor asks,
"Explain to me how you set this part up..."

Read all of the ULS information I have accumulated here on my site
(yes, read it ALL):

http://home.bendbroadband.com/conrad....html#Security


Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #4
"Br@dley" wrote in message:
news:J6***************@news-server.bigpond.net.au...
Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.


Yep, very possible.
A working sample here:

http://members.shaw.ca/glenk/access2000.html
(Look for Security & Log On Demo Database For Access2000 (Richard Rensel)

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #5
"Br@dley" wrote in message:
news:J6***************@news-server.bigpond.net.au...
Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.


Yep, very possible.
A working sample here:

http://members.shaw.ca/glenk/access2000.html
(Look for Security & Log On Demo Database For Access2000 (Richard Rensel)

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #6
Hi Jeff,
Got it - I'll look it over and see whether it will work in this environment.
Thanks very much,
Chuck

"Jeff Conrad" <je***@ernstbrothers.com> wrote in message
news:42**********@spool9-west.superfeed.net...
"Br@dley" wrote in message:
news:J6***************@news-server.bigpond.net.au...
Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.


Yep, very possible.
A working sample here:

http://members.shaw.ca/glenk/access2000.html
(Look for Security & Log On Demo Database For Access2000 (Richard Rensel)

Nov 13 '05 #7
Jeff,

The zip file has instructions how to open the database.
Unfortunately, either the username or password have been modified since the
last time you saved it.
Please look into this and let me when it's safe to get it again.

Thanks very much,
Chuck
"Jeff Conrad" <je***@ernstbrothers.com> wrote in message
news:42**********@spool9-west.superfeed.net...
"Br@dley" wrote in message:
news:J6***************@news-server.bigpond.net.au...
Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.
Yep, very possible.
A working sample here:

http://members.shaw.ca/glenk/access2000.html
(Look for Security & Log On Demo Database For Access2000 (Richard Rensel)

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet

News==---- http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups ----= East and West-Coast Server Farms - Total Privacy via Encryption

=----
Nov 13 '05 #8
Chuck,

I did not create that file.
Someone named Richard Rensel did.
That is not my site nor my file.

What error message are you getting?

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

"Chuck Insight" wrote in message:
news:Niyue.81066$x96.14902@attbi_s72...
Jeff,

The zip file has instructions how to open the database.
Unfortunately, either the username or password have been modified since the
last time you saved it.
Please look into this and let me when it's safe to get it again.

Thanks very much,
Chuck
"Jeff Conrad" <je***@ernstbrothers.com> wrote in message
news:42**********@spool9-west.superfeed.net...
"Br@dley" wrote in message:
news:J6***************@news-server.bigpond.net.au...
Or you can make up a "pretend" security system where users login using a
simple form and user data is stored in a simple table.... not secure but
enough to fool basic users for non-critical data.


Yep, very possible.
A working sample here:

http://members.shaw.ca/glenk/access2000.html
(Look for Security & Log On Demo Database For Access2000 (Richard Rensel)

--
Jeff Conrad
Access Junkie
http://home.bendbroadband.com/conrad...essjunkie.html
http://www.access.qbuilt.com/html/articles.html

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet

News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+

Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption

=----


----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: Ghazan Haider | last post by:
I am posting this for the lack of a better newsgroup, and for the knowledge of people here, and because its only partially OT. We have a bunch of users with their computers at work. There are...
5
by: Matthew Louden | last post by:
I wrote ASP.NET application that access SQL Server database. When I run the application, it yields "Login failed for user '<COMPUTER_NAME>\ASPNET'" error message. I then did the following, but...
3
by: Joe Fawcett | last post by:
Dear All We have an application where users login, their name/password details are stored in a table, and now we want to add a third party bulletin board that lives in its own virtual directory....
7
by: Alan Silver | last post by:
Hello, Sorry this is a bit wordy, but it's a pretty simple question... I have a web site, http://domain/ which is a public site, part of which (http://domain/a/) is protected by forms...
1
by: Friends | last post by:
Hi I need to set security for row level but not based on Database user's login. It should be based on the user table login. For the particular user I need to allow only the particular records to...
7
by: Samuel Shulman | last post by:
Is there a method that will indicate the person who logged successfully is Logged and therefore allowed to browse freely other then using the...
0
by: muder | last post by:
I have a standard Login ASP.NET 2.0 control on a login Page, a LoginName and LoginStatus controls on the member's page. once the user login successfully I am redirecting the user to Member.aspx...
19
by: klenwell | last post by:
Another request for comments here. I'd like to accomplish something like the scheme outlined at this page here: http://tinyurl.com/3dtcdr In a nutshell, the form uses javascript to hash...
9
by: =?Utf-8?B?cmtibmFpcg==?= | last post by:
Where can I get a sample login page with all functionalities (such as checking the password in the database, create cookies, check security and so forth). Code in C# would be fine. It it is...
0
by: DanWeaver | last post by:
Hi, Any pointers much appreciated- I just don't know how to progress from here. Using MS SQL server on a shared host (www.joglab.com shows the problem) I am having a problem with logins-...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.