473,418 Members | 2,138 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,418 software developers and data experts.

Securing only certain forms?

In a Database I'm attempting to create, I need certain forms to be
visible to one user group; and other forms to be invisble to them. One
of the forms that needs to be visible has a link to a forbidden form
and, unfortunatly, has to stay that way unless there is a way to have a
different form open at Startup for different users.

I created the users in the Tools > security > User and Group Accounts
menu.

Any help would be appreciated, bearing in mind I'm working on this on a
school system.

Thanks,
Naomi.

Dec 15 '05 #1
2 1268

<bl*************@gmail.com> wrote in message
news:11**********************@o13g2000cwo.googlegr oups.com...
In a Database I'm attempting to create, I need certain forms to be
visible to one user group; and other forms to be invisble to them. One
of the forms that needs to be visible has a link to a forbidden form
and, unfortunatly, has to stay that way unless there is a way to have a
different form open at Startup for different users.

I created the users in the Tools > security > User and Group Accounts
menu.

Any help would be appreciated, bearing in mind I'm working on this on a
school system.


This can be done with user level security, but there is WAY more to setting up
security then simply going to the security menu and creating users. If you have
not followed to the letter an explicit step by step set of instructions then
anything you have done up to now in this regard has been a waste of time.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Dec 15 '05 #2
<bl*************@gmail.com> wrote in message
news:11**********************@o13g2000cwo.googlegr oups.com...
there is a way to have a
different form open at Startup for different users.


In addition to Rick's comments, you can code Access to open up forms
depending on which user is logged on. If you're on a client-server network
then this needn't involve setting up user-level security, which is a major
undertaking. It all depends on what level of security you're looking for
and what security risks you need to mitigate - bear in mind that a
determined hacker can break Access security with the right tools.

HTH - Keith.
www.keithwilby.com
Dec 15 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Chris Dunaway | last post by:
A quick scan of the group did not immediately reveal an answer to my questions so here goes. First let me describe my app and then I'll ask the questions. I am writing a Windows Forms App (not...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
4
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my...
0
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas is the author of Designing Microsoft ASP.NET...
4
by: MatthewRoberts | last post by:
Howdy All, We have an ASP.NET web application that uses Forms Authentication and has worked without problems for some time. However, we recently added a Shockwave SWF file to the mix for flash...
3
by: Marty | last post by:
Hi, My main application is calling a couple of dll assembly that we made. I want to secure those dll assembly so they can't be used by a third party. I did a couple of test with on both...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
1
by: pantone187 | last post by:
Hi everyone, I'm a pretty novice PHP programmer as all I've done so far is to do simple registration forms for events. The data that's going from the from to the database (mySQL) didn't need much...
3
by: damola | last post by:
Good day everyone Please how can i prevent access to certain forms in ms access database 2007. i want it to be in such a way that when i enter user login,it automatically detects the forms the user...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.