473,408 Members | 1,722 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

Securing an Access Database.

D
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?

May 7 '07 #1
2 1822
D wrote:
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?
No. If they can you missed a step.

--
Rick Brandt, Microsoft Access MVP
Email (as appropriate) to...
RBrandt at Hunter dot com
May 7 '07 #2
Hi, David.
If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?
In many cases, yes, but only if certain vital steps were missed. To give
you an idea of which steps were missed, even after taking those steps you
described, the database will not be secured under any of the following
circumstances:

1.) The workgroup information file used to secure the database is the
default workgroup information file.

2.) The owner of the database is the default Admin user, even if the owner
is later changed to another user.

3.) The owner of all the objects is originally the default Admin user, even
if ownership is later transferred to another user.

4.) The Access 2000 Security Wizard is used to secure the database.

5.) The Users group has permissions to open and run the database.

6.) Any member of the Admins group doesn't have a password set, or the
password is easily guessed.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.
"D" <da***********@virgin.netwrote in message
news:g6********************************@4ax.com...
If you secure an MSACCESS Database using a Workgroup Information File
WIF and then setting up permissions removing the Admin user from the
its default group, repalce it with another named user, transfer all
the ownership of objects to the new user. Then run the database
security wizard. If after this the mdb file is placed on a different
users PC which is still using the defauult system.mdw file should they
still be able to open the database with full rights and permissions ?

May 7 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
4
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my...
7
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
9
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1....
4
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+...
4
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a...
4
omerbutt
by: omerbutt | last post by:
hi every one I am A new Bee to php mysql and i was surfing through the net to learn about how to secure the mysql when you are working in a web environment while working with php html and javascript...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.