473,466 Members | 1,465 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

How to set up read-only accessibility to an existing .mdb

RE: Access 2002 SP3

I have an app "App1.mdb" that has internal security built-in via a
table: tblSecurity. In this table a match is obtained to see if they
are authorized to use the app.
This application has no Jet security being used ("Users/Groups", etc.)

One of the requirements was to hide the DBWindow completely from the
users, which works fine and the DBwindow is secure from all users.
Another requirement for App1.mdb: the users need to create ad-hoc
reports in the report designer area of this app.

Is there a way to create a second .mdb "App2.mdb" that links to the
tables in App1.mdb, but with purely read-only capability?

Any counsel is appreciated.

Thank you.

Nov 13 '05 #1
7 2454
Br
TechBoy <ro******@msn.com> wrote:
RE: Access 2002 SP3

I have an app "App1.mdb" that has internal security built-in via a
table: tblSecurity. In this table a match is obtained to see if they
are authorized to use the app.
This application has no Jet security being used ("Users/Groups", etc.)

One of the requirements was to hide the DBWindow completely from the
users, which works fine and the DBwindow is secure from all users.
Another requirement for App1.mdb: the users need to create ad-hoc
reports in the report designer area of this app.

Is there a way to create a second .mdb "App2.mdb" that links to the
tables in App1.mdb, but with purely read-only capability?

Any counsel is appreciated.

Thank you.


To do it properly you'd need to implement obviously workgroup security.
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #2
RLN
To do it properly you'd need to implement obviously workgroup

security<<

I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup
security in MyApp.mdb or MyAppData.mdb for the users to have pure
"read-only" accessibility to all table for creating adhoc
reports/queries?

Thanks.
*** Sent via Developersdex http://www.developersdex.com ***
Nov 13 '05 #3
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<


I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the workgroup
security in MyApp.mdb or MyAppData.mdb for the users to have pure
"read-only" accessibility to all table for creating adhoc
reports/queries?


If you go with User Level Security you would need it on BOTH files.
Security is controlled by the workgroup file and there is only one of those
per Access session so the file you open directly and any file that is has
links to are all affected by it.

If you want ALL users to be read only you can simply place the data file in
a folder where they have read-only permissions. If you want some to be
limited to read only and others to be able to edit data, then User Level
Security is the way to go. Network permissions cannot be used for that.

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #4
RLN
To do it properly you'd need to implement obviously workgroup

security<<

One more thing I forgot to mention that had me concerned on this
subject.
Before, I tried to set up some user security. When I did that, my app
prompted me for a username and pass, which was fine. The only thing
wrong with that was that after I set that up on the other PC here in my
cube, every time I would launch Access (ver. 2002) on that other PC,
**any** database file I would open up (even ones created a long time
ago) would prompt me for that username and pass I had only wanted to use
for my current application I mentioned earlier in this my first reply.

So I guess my concern is when you mentioned setting up workgroup
security, I thought 'oh gee, here I go again....I'll set this up on this
2nd machine and when Access tries to open *any* .mdb, I'll be prompted
for a password."

So my hesitancy on this whole workgroup security thing is wrapped around
the fact that Access made me log in to all databases, not just the one I
really need security for.

I'll search for some info on this, but if anyone has other words of
wisdom for me, I'm still reading......
Thanks.

----------
"Perseverance - there is no substitute for hard work."
- Thomas Alva Edison

*** Sent via Developersdex http://www.developersdex.com ***
Nov 13 '05 #5
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<


One more thing I forgot to mention that had me concerned on this
subject.
Before, I tried to set up some user security. When I did that, my app
prompted me for a username and pass, which was fine. The only thing
wrong with that was that after I set that up on the other PC here in
my cube, every time I would launch Access (ver. 2002) on that other
PC, **any** database file I would open up (even ones created a long
time ago) would prompt me for that username and pass I had only
wanted to use for my current application I mentioned earlier in this
my first reply. [snip]


That only happens if you tell the security wizard that you want to make the
new secured workgroup file your default workgroup file. Login prompts are
dictated by the workgroup, not the MDB file being opened. If you tell the
wizard to create a special shortcut for your secured app then you are only
prompted for a login when you use that shortcut.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #6
Hi, Rick.
If you want ALL users to be read only you can simply place the data file in
a folder where they have read-only permissions. If you want some to be
limited to read only and others to be able to edit data, then User Level
Security is the way to go. Network permissions cannot be used for that.


Actually, they can. The trick is that you have to grant write
permissions to all users for the _folder_ in which the .mdb file
resides (so they can manipulate the .ldb file) and then set the
permissions to read-only or read/write on the .mdb file itself.

So, if you have "thing.mdb" in a folder called "foo" and two groups of
users, "ReadUsers" and "ChangeUsers", then the required permissions
are...

on the folder "foo": _both_ "ReadUsers" and "ChangeUsers" need
read/write permissions

on the file "thing.mdb": give "ChangeUsers" read/write and give
"ReadUsers" read-only permissions
Gord

Nov 13 '05 #7
Br
Rick Brandt <ri*********@hotmail.com> wrote:
RLN wrote:
To do it properly you'd need to implement obviously workgroup
security<<
I have never worked with Jet security before. Is it pretty
straightforward or are there some resources that would be helpful in
walking me through setting it up?
Reason I ask is, I have my application broke up into 2 .mdb files:

MyApp.mdb and MyAppData.mdb.

The data version has all the tables only, while the other has all the
forms, controls, modules, report, etc.

MyApp.mdb has links to tables in MyAppData. Do I set up the
workgroup security in MyApp.mdb or MyAppData.mdb for the users to
have pure "read-only" accessibility to all table for creating adhoc
reports/queries?

If you go with User Level Security you would need it on BOTH files.
Security is controlled by the workgroup file and there is only one of
those per Access session so the file you open directly and any file
that is has links to are all affected by it.

If you want ALL users to be read only you can simply place the data
file in a folder where they have read-only permissions. If you want
some to be limited to read only and others to be able to edit data,
then User Level Security is the way to go. Network permissions
cannot be used for that.


Although to confuse things you can use two different workgroup files.
One contains your users, the other the design admins. This way there is
physically no way anyone can login to gain access to your design (tables
usually as I distribute MDE frontends). Of course my user groups have
been created exactly the same in each workgroup else it won't work.

(Although again a simple tool will break the security anyway if one was
really keen to gain access:)
--
regards,

Bradley

A Christian Response
http://www.pastornet.net.au/response
Nov 13 '05 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Gunnar | last post by:
Hello, I've just written a CPP program that reads integers from a binary file, and used this code while (my_ifstram.read( (char* ) &number, sizeof(int)) { // do something with number } My...
6
by: Steve | last post by:
Hi, I'm trying to convert a file reading loop into one using streams. The BSD OS read API returns the number of bytes read, but istream::read returns itself. How can I find out the number of...
12
by: Steven T. Hatton | last post by:
I know of a least one person who believes std::ifstream::read() and std::ofstream::write() are "mistakes". They seem to do the job I want done. What's wrong with them. This is the code I...
2
by: Sandman | last post by:
Just looking for suggestion on how to do this in my Web application. The goal is to keep track of what a user has and hasn't read and present him or her with new material I am currently doing...
2
by: Andrea Bauer | last post by:
Hallo, wie kann ich so eine Datei unter .Net schreiben C++ oder C#. Bitte mit Funktionsaufrufen. Vielen Dank. Grüße Andrea <Product> <ProgramNumber>2</ProgramNumber>
4
by: Ollie Cook | last post by:
Hi, I am having some difficulty with read(2) and interrupting signals. I expect I am misunderstanding how the two work together, so would appreciate some guidance. I am trying to 'time out' a...
1
by: Jose Reckoner | last post by:
I'm running python 2.3 on Windows XP. Anyone have a quick small script to convert .DT1 and .DEM data to ASCII or some other format? I don't need a viewer. Thanks!
0
by: phplasma | last post by:
Hey, I am currently attempting to implement a multi-threaded C# socket, using SSL (.pem file/certification/private key combo) server using Visual Studio C# Express. I have successfully made...
4
by: zl2k | last post by:
hi, there I have a appendable binary file of complex data structure named data.bin created by myself. It is written in the following format: number of Data, Data array Suppose I have...
5
by: Thomas Christensen | last post by:
This issue has been raised a couple of times I am sure. But I have yet to find a satisfying answer. I am reading from a subprocess and this subprocess sometimes hang, in which case a call to...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.