473,379 Members | 1,386 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,379 software developers and data experts.

Access Security

1
Like most on this forum I'am not a programmer. I'm not exactly new to Access, but it has been several years since I have created a database.

I have created a database in Access 2003. I will have 5 total user's (including myself) so far. The database will be ran on 5 different workstations. Now, I have created this on my workstation (not the server) and I'm trying to figure out what type of security I should use. I would like all users to have specific permissions, however I have heard that Access's built in Security Wizard does not work well. I have tried using it before and it literally kicked me (as Admin) out of my own database! Does anyone have any ideas on what I could use?! Preferrably something user friendly that doesn't require me to write any code. :) Thanks so much!
Nov 10 '06 #1
4 1246
NeoPa
32,556 Expert Mod 16PB
I don't think there is any possibility of using any other form of security in an Acess database.
The good news is that it shouldn't require coding.
Explore the 'Security' item on the Tools menu.
Nov 11 '06 #2
PEB
1,418 Expert 1GB
Or define your own security for those users without using the built -in securities..

In those case you have to do some coding and defend the Access to the main database window and some buil-in functions...

Also see the question about the Shift key...

It was discussed here... And your security can be very performing...
Nov 11 '06 #3
ADezii
8,834 Expert 8TB
Like most on this forum I'am not a programmer. I'm not exactly new to Access, but it has been several years since I have created a database.

I have created a database in Access 2003. I will have 5 total user's (including myself) so far. The database will be ran on 5 different workstations. Now, I have created this on my workstation (not the server) and I'm trying to figure out what type of security I should use. I would like all users to have specific permissions, however I have heard that Access's built in Security Wizard does not work well. I have tried using it before and it literally kicked me (as Admin) out of my own database! Does anyone have any ideas on what I could use?! Preferrably something user friendly that doesn't require me to write any code. :) Thanks so much!
One helpful hint may be to assign specific permissions to Objects within the
Database to pre determined Groups and not individual Users. It's a lot easier
to assign permissions to a Groups then add Users to them then it is to assign
individual permissions. Also, make sure to disable the Shift-By Pass key
combination if security is a real issue. If you need the code, I'll be more than happy to supply it to you. You may also want to consider assigning Administrative privileges to a User than the Defalut admin and then removing the admin User from the Admin Group, etc.

Hope this helps
Nov 11 '06 #4
MMcCarthy
14,534 Expert Mod 8TB
Check this site out. It covers all aspects of Access security thououghly.

http://www.jmwild.com/Accesssecurity.htm


Like most on this forum I'am not a programmer. I'm not exactly new to Access, but it has been several years since I have created a database.

I have created a database in Access 2003. I will have 5 total user's (including myself) so far. The database will be ran on 5 different workstations. Now, I have created this on my workstation (not the server) and I'm trying to figure out what type of security I should use. I would like all users to have specific permissions, however I have heard that Access's built in Security Wizard does not work well. I have tried using it before and it literally kicked me (as Admin) out of my own database! Does anyone have any ideas on what I could use?! Preferrably something user friendly that doesn't require me to write any code. :) Thanks so much!
Nov 12 '06 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

32
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get...
13
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling...
7
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the...
11
by: Will | last post by:
I am looking at using a table with user names, passwords and user rights, which I would administer. I have read a lot about the shortfalls of this and the lack of security but the customer does...
3
by: mar10 | last post by:
I am creating a database in Access 2002 for a small firm that would like security on the tables. They want some employees to have write access only to tables, while others read-only. I have not...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
17
by: DaveG | last post by:
Hi all I am planning on writing a stock and accounts program for the family business, I understand this is likely to take close to 2 years to accomplish. The stock is likely to run into over a...
38
by: Oldie | last post by:
I have built an MS Access Application under MS Office XP (but I also own MS Office 2000). I have split the application in the pure database tables and all the queries, forms, reports and macro's. ...
23
by: Reggie | last post by:
Hi and TIA. I developed several A2K dbs which are now being run on my clients computer which have been upgraded to Access 03. I'm not sure exactly what they mean but of you know or could point me...
7
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. ...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.