473,404 Members | 2,137 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

custom log-in

Can anyone coach me in a custom log-in screen? I have a table set up
with users and a password. I don't need high-level security, just the
ability to recognize the stored user without API calls and genuine
MS-Access security (just don't want to implement workgroups at this
time). So basically the user sign in form would authenticate the user
and password (IF - Then) and store that value in a hidden form that
would remain open but invisible. Then I could reference the
Forms!Logon!Textbox value stored (but if I have multiple users that's a
problem (?)). What I ultimately want the stored value to do is allow me
to pass it into some queries for filtering reports and displays.
Any ideas? Thanks in advance!

Aug 26 '06 #1
3 1498
Parasyke wrote:
Can anyone coach me in a custom log-in screen? I have a table set up
with users and a password. I don't need high-level security, just the
ability to recognize the stored user without API calls and genuine
MS-Access security (just don't want to implement workgroups at this
time). So basically the user sign in form would authenticate the user
and password (IF - Then) and store that value in a hidden form that
would remain open but invisible. Then I could reference the
Forms!Logon!Textbox value stored (but if I have multiple users that's
a problem (?)). What I ultimately want the stored value to do is
allow me to pass it into some queries for filtering reports and
displays.
Any ideas? Thanks in advance!
You've pretty much described the whole thing and no, multple users would not be
a problem. What part of what you've outlined above are you having problems
with?

Use DLookup() to test the UserName and Password entered.

Use Me.Visible = False to hide the form.

--
Rick Brandt, Microsoft Access MVP
Email (as appropriate) to...
RBrandt at Hunter dot com
Aug 26 '06 #2
"Parasyke" <kr************@yahoo.comwrote in
news:11**********************@b28g2000cwb.googlegr oups.com:
Can anyone coach me in a custom log-in screen? I have a table
set up with users and a password. I don't need high-level
security, just the ability to recognize the stored user
without API calls and genuine MS-Access security (just don't
want to implement workgroups at this time). So basically the
user sign in form would authenticate the user and password (IF
- Then) and store that value in a hidden form that would
remain open but invisible. Then I could reference the
Forms!Logon!Textbox value stored (but if I have multiple users
that's a problem (?)).
that's not a problem. since the form is not bound to a table,
the value in one instance of access is invisible to the other
instances of access.

What I ultimately want the stored value
to do is allow me to pass it into some queries for filtering
reports and displays. Any ideas? Thanks in advance!
I create an unbound form that contains several labels and one
button. The form is on a timer that opens the main menu form and
makes the welcome form invisible, then sets the timer interval
to 0. The button just executes the On timer event.

I load several pieces of data into the labels' caption
properties in the startup code, such as the machine ID and User
name. The welcome form will show "Good morning, Parasyke" and "
Welcome to the Whatchemecallit database"

Just use the login form and make it invisible after the user has
passed the login password test you create.

--
Bob Quintal

PA is y I've altered my email address.

--
Posted via a free Usenet account from http://www.teranews.com

Aug 26 '06 #3
Any code snippet on how to use the DLookup() (I'm assuming stored in
the form's SQL rather than a separate query?).... Thanks!

Rick Brandt wrote:
Parasyke wrote:
Can anyone coach me in a custom log-in screen? I have a table set up
with users and a password. I don't need high-level security, just the
ability to recognize the stored user without API calls and genuine
MS-Access security (just don't want to implement workgroups at this
time). So basically the user sign in form would authenticate the user
and password (IF - Then) and store that value in a hidden form that
would remain open but invisible. Then I could reference the
Forms!Logon!Textbox value stored (but if I have multiple users that's
a problem (?)). What I ultimately want the stored value to do is
allow me to pass it into some queries for filtering reports and
displays.
Any ideas? Thanks in advance!

You've pretty much described the whole thing and no, multple users would not be
a problem. What part of what you've outlined above are you having problems
with?

Use DLookup() to test the UserName and Password entered.

Use Me.Visible = False to hide the form.

--
Rick Brandt, Microsoft Access MVP
Email (as appropriate) to...
RBrandt at Hunter dot com
Aug 29 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Randy Jackson | last post by:
I'm trying to set up a simple redirect for errors and log them to a custom file. I'm doing this for work on remote servers where I may not have access to their error.log. Anyway, the code I've...
4
by: Paul Woods | last post by:
I'm developing an application that uses a custom 404 page to deliver all of my site's content. However, doing things this way renders IIS's regular log files pretty much useless. Are there any...
6
by: Matt | last post by:
I notice that when you have the defualt setup of 404 error pages the IIS 5.0 log tracks the page the user was trying to get to and the page they where at when they tryed to get to the now missing...
1
by: Victor | last post by:
I am developing a windows service application that uses a custom event. the problem is that the service installer associates the service with application log during the installation process....
0
by: Cuperman | last post by:
Does anyone know of an issue where a Configuration Exception is thrown when "Program Files" is used as part of the initialiseData value within a custom listener? eg: <system.diagnostics> <trace...
2
by: Marauderz | last post by:
OK this just seems to be a common question being asked around here, I've tried Google Grouping the question but I still haven't came up with a solution yet. So here goes... I'm getting the...
0
by: | last post by:
Hi I am having problem with the custom log I have created. When I open the properies page of the log, all the following information were shown "not available" Size Created Modified Accessed
0
by: yousefomar | last post by:
Hi Pros, I have a weird problem here. I am logging from my .NET app to a custom log, but unfortunately, the events are redirected to the Application log. I am sure that I am specifying the log...
3
by: | last post by:
I want to write some custom error messages to a log so that I can read them on the next run of the application and as the user to send them to me. Where the right place to store this log file?...
0
by: =?Utf-8?B?QWxoYW1icmEgRWlkb3MgS2lxdWVuZXQ=?= | last post by:
Hi all, Can somebody give me a hint why my custom install action does not register event log sources, when I run the MSI package generated by VS2005. The same install action DLL executed via...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.