472,354 Members | 2,135 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,354 software developers and data experts.

Securing database with separate front-end / back-end

Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.

--
Stephen Poley
Aug 1 '06 #1
4 2694
On Tue, 01 Aug 2006 21:03:04 +0200, Stephen Poley
<sb******************@xs4all.nlwrote:

Few comments:
* The term "back-end" occurs 23 times in the S-FAQ. Several topics
(e.g. table links) only make sense in the context of split databases.
* MySQL is not necessarily a secure db. I woudn't name it in the same
breath as Oracle or SQL Server.
* The Exchange "feature" you're experiencing is not related to that
core product, but to configuration options or 3rd party tools.

-Tom.

>Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.
Aug 2 '06 #2
On Tue, 01 Aug 2006 20:34:19 -0700, Tom van Stiphout
<no*************@cox.netwrote:
>On Tue, 01 Aug 2006 21:03:04 +0200, Stephen Poley
<sb******************@xs4all.nlwrote:

Few comments:
* The term "back-end" occurs 23 times in the S-FAQ. Several topics
(e.g. table links) only make sense in the context of split databases.
I'm not quite sure what you're saying there. Are you suggesting that the
material in my page is in fact in the FAQ? (And if so, which section?)
>* MySQL is not necessarily a secure db. I woudn't name it in the same
breath as Oracle or SQL Server.
That's probably a fair comment. I will remove it.
>* The Exchange "feature" you're experiencing is not related to that
core product, but to configuration options or 3rd party tools.
All I know is that (a) I've had that problem at all three Exchange-using
organisations where I've tried to mail MDB files, (b) on enquiring with
the system administrator of one of them, he said that this was standard
Exchange functionality, and that he had most certainly not selected any
option to block Access files.

>
-Tom.

>>Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.
--
Stephen Poley
Aug 2 '06 #3
Stephen Poley <sb******************@xs4all.nlwrote in
news:ji********************************@4ax.com:
Noticing that there are quite a lot of questions on this subject
in the Access newsgroups I have put together a page on the
subject, in the hope that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html
This article has useful information for beginners, but I don't see
that it is justified to call it an article on "security." It's
really more a primer on split databases, or more a jumble of topics
that are only loosely related.

And I agree that the Exchange issue seems completely out of place.

--
David W. Fenton http://www.dfenton.com/
usenet at dfenton dot com http://www.dfenton.com/DFA/
Aug 2 '06 #4
On Wed, 02 Aug 2006 13:42:09 -0500, "David W. Fenton"
<XX*******@dfenton.com.invalidwrote:
>Stephen Poley <sb******************@xs4all.nlwrote in
news:ji********************************@4ax.com :
>Noticing that there are quite a lot of questions on this subject
in the Access newsgroups I have put together a page on the
subject, in the hope that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

This article has useful information for beginners, but I don't see
that it is justified to call it an article on "security." It's
really more a primer on split databases, or more a jumble of topics
that are only loosely related.
I think you're exaggerating rather. Only about four paragraphs are not
directly related to the main subject. But I'll see if I can tighten it
up a bit. Thanks for responding.

--
Stephen Poley
Aug 3 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
7
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
8
by: John Baker | last post by:
Hi: I am URGENTLY in need of some book or web site OR tool that will help me integrate a relatively simple access application into a web page or pages. This is a time recording system (by...
2
by: Ian B | last post by:
This is a basic question for anyone who knows what they're doing with web server admin so hopefully someone will be able to assist me here!... I have a www based asp.net application which allows...
6
by: John | last post by:
Hi How can I make sure that no one else can call and receive data from my web methods? Thanks Regards
9
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1....
9
by: Harold Crump | last post by:
Greetings, I have a fairly vanilla PHP web application that stores and retrieves data in a MySQL database. Users will be adding a lot of special characters such as single and double quotes,...
4
omerbutt
by: omerbutt | last post by:
hi every one I am A new Bee to php mysql and i was surfing through the net to learn about how to secure the mysql when you are working in a web environment while working with php html and javascript...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very...
2
by: Kemmylinns12 | last post by:
Blockchain technology has emerged as a transformative force in the business world, offering unprecedented opportunities for innovation and efficiency. While initially associated with cryptocurrencies...
1
by: Matthew3360 | last post by:
Hi there. I have been struggling to find out how to use a variable as my location in my header redirect function. Here is my code. header("Location:".$urlback); Is this the right layout the...
2
by: Matthew3360 | last post by:
Hi, I have a python app that i want to be able to get variables from a php page on my webserver. My python app is on my computer. How would I make it so the python app could use a http request to get...
0
by: AndyPSV | last post by:
HOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and on my computerHOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and...
0
by: Arjunsri | last post by:
I have a Redshift database that I need to use as an import data source. I have configured the DSN connection using the server, port, database, and credentials and received a successful connection...
0
hi
by: WisdomUfot | last post by:
It's an interesting question you've got about how Gmail hides the HTTP referrer when a link in an email is clicked. While I don't have the specific technical details, Gmail likely implements measures...
1
by: Matthew3360 | last post by:
Hi, I have been trying to connect to a local host using php curl. But I am finding it hard to do this. I am doing the curl get request from my web server and have made sure to enable curl. I get a...
0
by: Carina712 | last post by:
Setting background colors for Excel documents can help to improve the visual appeal of the document and make it easier to read and understand. Background colors can be used to highlight important...
0
by: Ricardo de Mila | last post by:
Dear people, good afternoon... I have a form in msAccess with lots of controls and a specific routine must be triggered if the mouse_down event happens in any control. Than I need to discover what...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.