473,379 Members | 1,220 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,379 software developers and data experts.

Access Database Security

I have a client using an mde created in 1999 by someone else, for
which I don't have the original source. There is a workgroup file that
accompanies the mde file. I have the user and password information
required by the workgroup file.
In 2004 the client requested changes. Without the source, I
couldn't make the change to the mde file itself, so I wrote a small mdb
that attaches tables and provides a form to fulfill the client's new
requirements. I created a shortcut for the new mdb that includes the
workgroup info, and for 2 years everything has worked fine.
Suddenly, the client is getting permission errors whenever he
attempts to access his data. He can open my tool mdb, but not the
tables attached to it. As it works fine when re-installed on my
desktop, I figured his copy of the workgroup file had been corrupted or
overwritten. I sent him a replacement, but it didn't help.
Any ideas on where the permission errors might be coming from would
be greatly appreciated.

Jun 14 '06 #1
2 1211
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Permissions are kept in the .mdb/e file. The user name and passwords
are kept in the .mdw file. Check the .mde file's Security settings (if
you can). Also, if new queries have been created make sure they have
the RWOP (Run With Owner Option) property set to yes (checked). Then
make sure the proper user/groups have the proper permissions on those
queries.
--
MGFoster:::mgf00 <at> earthlink <decimal-point> net
Oakland, CA (USA)

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBRJB+poechKqOuFEgEQJ6wQCaAjXiRA5Z2r2PEO1NqcrATb kUAM8An3ud
pVakKHQHRQZd/LEIEAqjxJjw
=GgHK
-----END PGP SIGNATURE-----
ginnyk wrote:
I have a client using an mde created in 1999 by someone else, for
which I don't have the original source. There is a workgroup file that
accompanies the mde file. I have the user and password information
required by the workgroup file.
In 2004 the client requested changes. Without the source, I
couldn't make the change to the mde file itself, so I wrote a small mdb
that attaches tables and provides a form to fulfill the client's new
requirements. I created a shortcut for the new mdb that includes the
workgroup info, and for 2 years everything has worked fine.
Suddenly, the client is getting permission errors whenever he
attempts to access his data. He can open my tool mdb, but not the
tables attached to it. As it works fine when re-installed on my
desktop, I figured his copy of the workgroup file had been corrupted or
overwritten. I sent him a replacement, but it didn't help.
Any ideas on where the permission errors might be coming from would
be greatly appreciated.

Jun 14 '06 #2

MGFoster wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Permissions are kept in the .mdb/e file. The user name and passwords
are kept in the .mdw file. Check the .mde file's Security settings (if
you can). Also, if new queries have been created make sure they have
the RWOP (Run With Owner Option) property set to yes (checked). Then
make sure the proper user/groups have the proper permissions on those
queries.
--
MGFoster:::mgf00 <at> earthlink <decimal-point> net
Oakland, CA (USA)


Thank you. I didn't realize the permissions were separated from the
username/password info. I had assumed that the security item on the
mdb's Tools menu was accessing the mdw. I'll fire off a message to
John (the client) and have him take a look.

Jun 14 '06 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

13
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling...
5
by: kai | last post by:
Hi, All I try to block some one import my Access database tables using Access database. I used password protection, but if some one crack through my password, are there any other methods to...
5
by: lappy | last post by:
Hello, I have written a small programme to compact an access 97 database. Dim je As New JRO.JetEngine ' Compacts database Data.Mdb to Data2.mdb. je.CompactDatabase...
2
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a...
4
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The...
17
by: DaveG | last post by:
Hi all I am planning on writing a stock and accounts program for the family business, I understand this is likely to take close to 2 years to accomplish. The stock is likely to run into over a...
52
by: Neil | last post by:
We are running an Access 2000 MDB with a SQL 7 back end. Our network guy is upgrading to Windows Server 2003 and wants to upgrade Office and SQL Server at the same time. We're moving to SQL Server...
17
by: Mell via AccessMonster.com | last post by:
Is there a way to find out where an application was created from? i.e. - work or home i.e. - if application sits on a (work) server/network, the IT people know the application is sitting...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
7
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. ...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.