473,394 Members | 1,854 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

Each Access security group can have only one password?

When using Access security can each group have only one password?
So all members of the group have the same and/or one password?
Then in order to have each member of a group have their own password
then you would need a group for each member?

Feb 13 '07 #1
3 1831
<to*******@msn.comwrote in message
news:11**********************@a75g2000cwd.googlegr oups.com...
When using Access security can each group have only one password?
So all members of the group have the same and/or one password?
Then in order to have each member of a group have their own password
then you would need a group for each member?
I was not aware that a group has a password at all.....
So all members of the group have the same and/or one password?
No, each user that logs on has their own password. You then assign the
groups to the user.

So, users become members of groups....or, a better ways is to say that YOU
assign
each me (user) to a particular group.

There is no passwords involved in assigning those groups to each member.
(you have to have admim privileges to make those assignments).

So, you might assign some users to be a member of the SalesReprot group, and
they would be the only ones
that could view reports that are a member of that SalesReprot group.

If you always assigning users to member groups, then you NEVER actually put
the users names into the actual mdb.
Thus, you can freely deploy new updates to your clients, and their existing
security settings will NOT be lost
when you deploy that new front end to them. However, the instant you start
assigning actual users to actual forms,
or report (or any object), then when you deploy a new update, then those
setting the customer made will be lost
(assuming you are developing in a different location, or "off site" from
where the software is being used - this
also assume they are not making new "groups"). You should as a general rule
site down and make the groups
so that during development..as you add a new report, or whatever..you assign
it to the particular group of your
choice. Then as you add new users, you assign what user groups they belong
to (sales group, accounting group
....whatever you like). Take a look at the following screen shots to see what
I mean by sitting down and making some user
groups.

http://www.members.shaw.ca/AlbertKal...erFriendly.htm

--
Albert D. Kallal (Access MVP)
Edmonton, Alberta Canada
pl*****************@msn.com
Feb 13 '07 #2
Hello,

I have been asked to make modifications in a database but I am not
very familiar with Access. This database is accessed over the network,
by many concurrent users. Working directly in the production database,
apart from being bad practice in general I suppose:), is therefore not
an option. But taking it down isn't either. What I am looking for is
some pointers to sites/books that can supply me with guidelines on how
to best go about.

tia,
arno
Feb 13 '07 #3
sorry sorry, wrong shortcut key, was meant to be new thread - arno
Feb 13 '07 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Barb | last post by:
Hi there, I sincerely hope that someone out there can help. I have two instances of the SQL 2000 Desktop Engine running. One is on my local machine for development and the other is on another...
7
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the...
3
by: Mike Marriott | last post by:
Hello all, Newbie Here (please go easy, you cant make me fell more stupid than I allready do) I have a small, but complex data base, in Access 2000, that I am creating, I have allready...
3
by: patcho | last post by:
Hello, I have a problem that I was hoping to get some assistance with. I have built a split database (back end with all the tables and a password to protect the information & a front end to link...
8
by: carriolan | last post by:
Hi I have an MS Access based application almost ready for distribution to the public and I find that even though I have compiled it into an MDE file, tables and queries can still be be imported if...
9
by: Lars Netzel | last post by:
Hi, I have built an application that is driven by an access database. This is then deplaoy onto about 80 clients through an installation package that also proved a local copy of an emtyp...
12
by: Dr. Edmund M. Hayes | last post by:
I wrote a access program that works well enough that a handful of people would like to buy it from me. My problem is that if I sell it to someone there is no mechanism that I know of to protect...
4
by: mrouleau | last post by:
I am sorry if this is the wrong group to ask, if so please point me in the correct direction. My problem is I have an MDB file with user-level security on it (mdw). When i move it over to a...
3
by: Charlotte | last post by:
Hello, info: I'me a rookie with IIS I have on a WinXP Pro the IIS installed, so I can test some pages before uploading to the hostserver online on the hostserver is a possibility (with the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.