473,394 Members | 1,785 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

a2k - does supporting multiple users imply use of Access security?

i.e the best way to have multiple validated users on the system who can then
access the back-end? Or is it just as easy to write your own user
management and login form and base your code on that?
--

Nov 13 '05 #1
3 1531
Deano wrote:
i.e the best way to have multiple validated users on the system who
can then access the back-end? Or is it just as easy to write your
own user management and login form and base your code on that?


Having multiple users and implementing User Level Security have little to do
with each other. Only if you want different users to have different
permissions to certain areas of the app does ULS become a requirement. If
you just want to track user-names (who did what) then you can use an API
function to retrieve the Windows networking user name without bothering to
sett up Access security.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #2
Rick Brandt wrote:
Deano wrote:
i.e the best way to have multiple validated users on the system who
can then access the back-end? Or is it just as easy to write your
own user management and login form and base your code on that?


Having multiple users and implementing User Level Security have
little to do with each other. Only if you want different users to
have different permissions to certain areas of the app does ULS
become a requirement. If you just want to track user-names (who did
what) then you can use an API function to retrieve the Windows
networking user name without bothering to sett up Access security.


I'm mainly thinking about how I write the code to allow each user to access
the data. If I use ULS does that make development easier in implementing my
locking strategy etc?

Else if I use my existing login form I can differentiate users and work out
who's doing what at any one time. I think I would prefer this as I'm set
for alot of rewriting a good solid, working single-user app over the next
few months. Access security is one step that would be nice to leave out if
it's a luxury and only really needed if I want to lock down the data in the
mdb.

I'm still horribly naive about multi-user issues so forgive me for appearing
dense.

--
Nov 13 '05 #3
Deano wrote:
I'm mainly thinking about how I write the code to allow each user to
access the data. If I use ULS does that make development easier in
implementing my locking strategy etc?

Else if I use my existing login form I can differentiate users and
work out who's doing what at any one time. I think I would prefer
this as I'm set for alot of rewriting a good solid, working
single-user app over the next few months. Access security is one
step that would be nice to leave out if it's a luxury and only really
needed if I want to lock down the data in the mdb.

I'm still horribly naive about multi-user issues so forgive me for
appearing dense.


If you want your login to "provide guidance" then a home-grown system like
you have is fine. If you want something with some teeth then you have to
implement User Level Security and even that can be hacked by someone
determined to do so.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: rdh | last post by:
Hi all, I am in process of developing a Server in C++ supporting multiple protocols. The server will be exposing various functionalities, and the clients can communicate over any of the...
48
by: Nirvana | last post by:
How to make the font size constant in HTML code, so that in a web browser it remains fixed. For e.g in IE if you press CTRL and move mouse wheel front or back the font size changes, cheers
1
by: mary | last post by:
I am developing an Access db which will be used by multiple users. My questions are: Does MS Access have problems with multiple users accessing the db at once? If yes, what is your solution...
1
by: intl04 | last post by:
Are there any problems with multiple user access to the same Access database on a shared network drive? I have 'shared' chosen for 'default open mode'. As for the record locking properties, I...
6
by: James Radke | last post by:
Hello, I have a multithreaded windows NT service application (vb.net 2003) that I am working on (my first one), which reads a message queue and creates multiple threads to perform the processing...
20
by: Keith G. Murphy | last post by:
I'm trying to get a feel for what most people are doing or consider best practice. Given a mod_perl application talking to a PostgreSQL database on the same host, where different users are...
89
by: Cuthbert | last post by:
After compiling the source code with gcc v.4.1.1, I got a warning message: "/tmp/ccixzSIL.o: In function 'main';ex.c: (.text+0x9a): warning: the 'gets' function is dangerous and should not be...
3
by: TClancey | last post by:
Hi all. I have an app that needs to connect to either - an Access database, MySql database or MsSql database. It will be the end users decision which they want to use. I've done a lot of...
113
by: John Nagle | last post by:
The major complaint I have about Python is that the packages which connect it to other software components all seem to have serious problems. As long as you don't need to talk to anything outside...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.