473,405 Members | 2,167 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Securing database with separate front-end / back-end

Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.

--
Stephen Poley
Aug 1 '06 #1
4 2793
On Tue, 01 Aug 2006 21:03:04 +0200, Stephen Poley
<sb******************@xs4all.nlwrote:

Few comments:
* The term "back-end" occurs 23 times in the S-FAQ. Several topics
(e.g. table links) only make sense in the context of split databases.
* MySQL is not necessarily a secure db. I woudn't name it in the same
breath as Oracle or SQL Server.
* The Exchange "feature" you're experiencing is not related to that
core product, but to configuration options or 3rd party tools.

-Tom.

>Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.
Aug 2 '06 #2
On Tue, 01 Aug 2006 20:34:19 -0700, Tom van Stiphout
<no*************@cox.netwrote:
>On Tue, 01 Aug 2006 21:03:04 +0200, Stephen Poley
<sb******************@xs4all.nlwrote:

Few comments:
* The term "back-end" occurs 23 times in the S-FAQ. Several topics
(e.g. table links) only make sense in the context of split databases.
I'm not quite sure what you're saying there. Are you suggesting that the
material in my page is in fact in the FAQ? (And if so, which section?)
>* MySQL is not necessarily a secure db. I woudn't name it in the same
breath as Oracle or SQL Server.
That's probably a fair comment. I will remove it.
>* The Exchange "feature" you're experiencing is not related to that
core product, but to configuration options or 3rd party tools.
All I know is that (a) I've had that problem at all three Exchange-using
organisations where I've tried to mail MDB files, (b) on enquiring with
the system administrator of one of them, he said that this was standard
Exchange functionality, and that he had most certainly not selected any
option to block Access files.

>
-Tom.

>>Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.

Noticing that there are quite a lot of questions on this subject in the
Access newsgroups I have put together a page on the subject, in the hope
that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

I do not however claim to be an Access guru, so I would be grateful if
people familiar with this area would have a look to check that nothing
there is obscure, incomplete, or plain screwed-up.
--
Stephen Poley
Aug 2 '06 #3
Stephen Poley <sb******************@xs4all.nlwrote in
news:ji********************************@4ax.com:
Noticing that there are quite a lot of questions on this subject
in the Access newsgroups I have put together a page on the
subject, in the hope that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html
This article has useful information for beginners, but I don't see
that it is justified to call it an article on "security." It's
really more a primer on split databases, or more a jumble of topics
that are only loosely related.

And I agree that the Exchange issue seems completely out of place.

--
David W. Fenton http://www.dfenton.com/
usenet at dfenton dot com http://www.dfenton.com/DFA/
Aug 2 '06 #4
On Wed, 02 Aug 2006 13:42:09 -0500, "David W. Fenton"
<XX*******@dfenton.com.invalidwrote:
>Stephen Poley <sb******************@xs4all.nlwrote in
news:ji********************************@4ax.com :
>Noticing that there are quite a lot of questions on this subject
in the Access newsgroups I have put together a page on the
subject, in the hope that it will be of use:

http://www.xs4all.nl/~sbpoley/tech/access-security.html

This article has useful information for beginners, but I don't see
that it is justified to call it an article on "security." It's
really more a primer on split databases, or more a jumble of topics
that are only loosely related.
I think you're exaggerating rather. Only about four paragraphs are not
directly related to the main subject. But I'll see if I can tighten it
up a bit. Thanks for responding.

--
Stephen Poley
Aug 3 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
7
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
8
by: John Baker | last post by:
Hi: I am URGENTLY in need of some book or web site OR tool that will help me integrate a relatively simple access application into a web page or pages. This is a time recording system (by...
2
by: Ian B | last post by:
This is a basic question for anyone who knows what they're doing with web server admin so hopefully someone will be able to assist me here!... I have a www based asp.net application which allows...
6
by: John | last post by:
Hi How can I make sure that no one else can call and receive data from my web methods? Thanks Regards
9
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1....
9
by: Harold Crump | last post by:
Greetings, I have a fairly vanilla PHP web application that stores and retrieves data in a MySQL database. Users will be adding a lot of special characters such as single and double quotes,...
4
omerbutt
by: omerbutt | last post by:
hi every one I am A new Bee to php mysql and i was surfing through the net to learn about how to secure the mysql when you are working in a web environment while working with php html and javascript...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.