473,406 Members | 2,707 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,406 software developers and data experts.

Can I secure a single table with a password?

153 100+
I've got an access table that I need to be secured. It will be on a fileshare that only people that can see the information will be able to access, I simply want to put a password on editing capabilities. Can this be done for a single table without having it be user specific but rather password specific?
Dec 20 '06 #1
13 16307
ADezii
8,834 Expert 8TB
I've got an access table that I need to be secured. It will be on a fileshare that only people that can see the information will be able to access, I simply want to put a password on editing capabilities. Can this be done for a single table without having it be user specific but rather password specific?
I do not believe that you can supply a Password that will allow editing of a specific Table in an Access Database. How about creating a Group and allow only this Group exclusive access to this Table and no others. You would then add the appropriate Users to this Group.
Dec 21 '06 #2
nico5038
3,080 Expert 2GB
Sorry, but Access tables are always "unprotected" when a use can see the table (s)he can manipulate it..
When your users have only the Access runtime installed and no copy from Access themselves, you'll be able to control the table as such users can only work with the form's you build and can't get the tables opened directly.
When they have a fully installed copy, then your only chance is to install MS SQL or another database supporting stored procedures and triggers.

Nic;o)
Dec 21 '06 #3
Kosmos
153 100+
okay but since most of my code is done through the use of modules, I could make reference to another database that is password protected I guess. Or I'll just put the information in another access database and have it pulled into a temporary table in the new one, I guess.
Dec 21 '06 #4
nico5038
3,080 Expert 2GB
Indeed, both will be valid options and by making a connection to a secured database without a password in the connection string will give a password popup.

Best however to use a non-access database as the backend.

Perhaps this MS PAQ gives some additional information:
http://support.microsoft.com/support...-US&SD=gn&FR=0

And a good book on the subject is found at:
http://www.vb123.com/map/

Success !

Nic;o)
Dec 21 '06 #5
Kosmos
153 100+
Thanks for your reply. It turns out that I might not even have to add users. People that have access to this will only be able to get to it through a part of our network which only gives them read capability. Only myself and my direct boss have read-write on this part of the network so I went through a bunch of trouble for nothing. Anyways thanks for your help everyone.
Dec 21 '06 #6
nico5038
3,080 Expert 2GB
Only read access can be giving trouble as Access requires the creation/update od a .ldb file that holds the users....

Nic;o)
Dec 22 '06 #7
Kosmos
153 100+
Hmm this may potentially be a problem. I'll have to test this out. Thanks for letting me know.
Dec 22 '06 #8
Kosmos
153 100+
I am not sure of the abilities and limits that will be imposed on the users over the network but assuming that I could run into a problem, is there a way to export all created files to something like C:/Temp on the user's computer? I am not only worried about the standard temporary file but I also temporarily fill up tables which are then exported to excel. I open a bunch of database connections then, through a bunch of VBA, selectively export important data into four separate tables. This code is then, however, cleared and the database is immediately closed and compacted after this function is run if that makes any difference in the way this code is written?
Dec 22 '06 #9
Kosmos
153 100+
just to add to the above...^^^^ I'm not worried about people taking the information out and onto their computer...they're supposed to be able to print up reports from this anyways...I just want to make sure they can not edit any information. I also have to create a log. This is getting complicated :(
Dec 22 '06 #10
nico5038
3,080 Expert 2GB
Simple solution could be to copy the backend .mdb e.g. overnight from the (hidden) production folder to a folder they have access to. When they would make changes this will be corrected the next day....

Nic;o)
Dec 22 '06 #11
nico5038
3,080 Expert 2GB
Forgot to mention that when you only give your users a runtime environment (no full blown Access installation), then they can't even see the tables...

Nic;o)
Dec 22 '06 #12
Kosmos
153 100+
okay so a new question off of my first question...when I give people read only access, will they be able to write if I open by adLockOptimistic? I mean...when I open the recordset through adLockOptimistic, I have a field in a temporary table that needs to be calculated and inserted into that temporary table before the table is exported to excel and cleared.
Dec 26 '06 #13
nico5038
3,080 Expert 2GB
WHen the folder with the Access database is read-only they won't be able to open the database as the .ldb file can't be created/updated.
Using e.g. MS SQL or Oracle with a different Userid/Password for the (ODBC) connection would however solve this problem.

Nic;o)
Dec 26 '06 #14

Sign in to post your reply or Sign up for a free account.

Similar topics

7
by: ojorus | last post by:
Hello! I want to make a login system as secure as possible on a website I develop. * The user shall log on using a Username and a password (which is stored in a mySQL database) *The server...
2
by: Jason Smith | last post by:
I have recently designed an application in Ms Access with the folllowing security: 1) Database is split into a front-end / backend with linked tables 2) All modules are password protected 3)...
0
by: Wiktor Zychla | last post by:
Hello, after several investigations around ASP.NET, I would like to ask about the best practices for building a secure database application. suppose I wish to use Forms authentication in...
3
by: Kevin Richards | last post by:
I have a .NET web service that needs to be called from any platform. I need to make the Login method of the web service secure. It doesnt matter about the remaining methods, just the password...
4
by: Jamey Shuemaker | last post by:
A2k2 with user-level security and all preventive measures, vis a vis, Security FAQ enabled or enacted. I've got three DBs, which due to size constraints can't, or rather, probably shouldn't be...
7
by: Skijor | last post by:
I just finished writing my first php script that manipulates a simple shopping cart on a mySql database. I started with an example I found on the web. The example hardcodes the database server,...
1
by: pawan123 | last post by:
Hi, I am using VB6 and SQL Server 2000. I want to design a logon form. In this form, how can I use a Password field to store in encrypted form in tbluser table and how can I compare password...
1
by: timmmahh | last post by:
I'm trying to use the NegotiateStream functionality in .NET 2.0. I initially made the channel secure by simply adding the 'secure=true' attribute to the channel configuration settings. The...
5
topher23
by: topher23 | last post by:
I've seen a lot of questions about how to make secure database passwords. I'm going to go over a method of encrypting a password using the MD5 encryption algorithm for maximum security. First,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.