473,322 Members | 1,522 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,322 software developers and data experts.

Prevent Import Table Period.

Is there a way with MS Access 2002 and above to prevent people
importing from a blank Database the tables in another database? I
have done a lot of searches but there isn't really a solution that
will work for me. Would someone explain how to build a RWOP Query in
2002 and what it does exactly? I can prevent an access to a query,
but, what if people just tap into your table, and bypass your query?
May be I misunderstood what it does.

Perry

Jun 25 '07 #1
7 4507
If you use user-level security to prevent read access to the table, then
people can't read the table, even if they link to it or import it in another
database.

The RWOP query ("run with owner permissions") allows users to read and
potentially modify data in a table through the query because it gives them
owner permissions through that query only. Thus, if they go to the table
through the query, they have permissions; if they go direct to the table,
they don't.

Neil

<pe******@yahoo.comwrote in message
news:11**********************@n60g2000hse.googlegr oups.com...
Is there a way with MS Access 2002 and above to prevent people
importing from a blank Database the tables in another database? I
have done a lot of searches but there isn't really a solution that
will work for me. Would someone explain how to build a RWOP Query in
2002 and what it does exactly? I can prevent an access to a query,
but, what if people just tap into your table, and bypass your query?
May be I misunderstood what it does.

Perry

Jun 25 '07 #2
UserLevel security only works on the machine that has the levels
setup, right? If someone copied the FE and BE to another machine,
user security is virtually non-existenance, right? Or if people
copied the administrative .mdw (or some entension like that), then, it
is all over, isn't it?

Perry

Jun 26 '07 #3
No, when you apply UL security to the tables, then you can't access the
tables without UL security (unless you just use the built-in User account,
which would be meaningless to do anyway). So if you set up UL security and
then lose your MDW, well, you're SOL (unless you have a back-up copy, which
you should have).

Whoever uses your database with UL security will need the MDW file -- either
on their hard drive (recommended if over a WAN) or accessed over the
network. But having the MDW file doesn't do them any good without passwords
to the accounts. So, no, it's not all over if someone gets the MDW file.
<pe******@yahoo.comwrote in message
news:11*********************@q75g2000hsh.googlegro ups.com...
UserLevel security only works on the machine that has the levels
setup, right? If someone copied the FE and BE to another machine,
user security is virtually non-existenance, right? Or if people
copied the administrative .mdw (or some entension like that), then, it
is all over, isn't it?

Perry

Jun 26 '07 #4
On Jun 26, 5:22 pm, "Neil" <nos...@nospam.netwrote:
No, when you apply UL security to the tables, then you can't access
the
tables without UL security (unless you just use the built-in User
account,
which would be meaningless to do anyway). So if you set up UL
security and
then lose your MDW, well, you're SOL (unless you have a back-up copy,
which
you should have).
>Would using an import function from a blank DB be able to import the table by using UL security?
Whoever uses your database with UL security will need the MDW file --
either
on their hard drive (recommended if over a WAN) or accessed over the
network. But having the MDW file doesn't do them any good without
passwords
to the accounts. So, no, it's not all over if someone gets the MDW
file.
>If I placed this the MDW over in their HD, or over the network drive, won't they be able to open up the tables? I need the users to be able to access the table, but not able to view it. (i.e. I am setting up a security code, that everytime the database is open, it check an expiration date - part of a table; but I don't want users to view or change the expiration date on that table.) Does that make sense? Is this doable via UL security?
Perry

Jun 27 '07 #5
>>Would using an import function from a blank DB be able to import the
>>table by using UL security?
No, they wouldn't be able to import to a blank database. They could export
from the database to a blank database, but they couldn't import. So if you
take away all export capability in your db, you should be fine.
>>If I placed this the MDW over in their HD, or over the network drive,
won't they be able to open up the tables?
I don't know if you looked at Access security yet. But, if not, then it
might be a good idea to do so, as it might make it much clearer to you than
I can. Basically, you assign what permissions you want to which users or
user groups -- read, write, delete, add, etc., etc. It's not all or nothing.

As noted in my first message, you would remove permissions from them to be
able to open the table in any way, shape or form. The only way they can see
the data is through the RWOP query. So, unless you explicitly give them
permission to open the table (or, rather, unless you don't remove permission
for them to open the table), they will not be able to open the query, even
with the MDW file.
>I need the users to be able to access the table, but not able to view it.
Again, this was discussed in my first reply to you -- no permissions on the
table itself; access only through RWOP query.
> (i.e. I am setting up a security code, that everytime the database is
open, it check an expiration date - part of a table; but I don't want
users to view or change the expiration date on that table.) Does that
make sense? Is this doable via UL security?
Why don't you just put your expiration date in code as a constant and give
them a compiled MDE file?

In any case, yes, you can restrict access to the table via UL security.

Neil


Perry

Jun 27 '07 #6
Neil,
That helps a lot. Thank you. I will give it a try. BTW, the
reason I don't want to hardcode the exp.date was if user enter a right
date, then, I want it to advance for another period of time. I don't
want to remember to provide or physically email them another version
with the new date.

Perry

Jun 27 '07 #7
<pe******@yahoo.comwrote
That helps a lot. Thank you.
Access security features were aptly described by Roger Jenkins, in his book
"Access Developer Guide" for Access 2.0, as "labrynthine". It has not
gotten any simpler, and you canNOT expect to get security correct if you
simply use the Help and the Wizard.

Go to http://support.microsoft.com, and search the Knowledge Base for the
Access product for "Security FAQ"... download, print, and read. Now re-read,
then study carefully, then try to apply what you've learned on a _copy_ of
your database. That FAQ is about 40 pages of dense information (no filler
material), and it will take some time to learn and get it right.

And, don't be discouraged when you run into a "surprise" or two -- missing
one of the many steps can leave your database so un-secure that anyone can
get in (that's what happened when you moved it to another machine) or so
secure that even you cannot get in. That's why you do your experimentation
on a COPY, not the original.

Even so, if you think that getting the information you want to protect would
be worth US$150 or so to anyone with access to your database, then you
should consider another approach (such as putting the data in a server
database, with your Access application as the client, and using server
security). There are some clever programmers who have created "password
recovery" software (some, uncharitably, call it "security crack software")
that you can find on the Internet for about that price.

And, BTW, security is different on the new ACCDB of Access 2007, though you
can still create MDB / MDE and use the old MDW (workgroup security) model,
instead.

Larry Linson
Microsoft Access MVP
Jun 27 '07 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

14
by: Ludwig77 | last post by:
I read that there are some tags that can be entered in a web page's meta tags in order to prevent web bot searching and indexing of the web page for search engines. What is the tagging that I...
5
by: Colleyville Alan | last post by:
I need to import a spreadsheet into an Access table. The spreadsheet has performance for mutual funds for various periods. The problem is that if there is no info for a particular period, the...
4
by: Alan Lane | last post by:
Hello world: I'm including both code and examples of query output. I appologize if that makes this message longer than it should be. Anyway, I need to change the query below into a pivot table...
6
by: deko | last post by:
Is there a way to set a custom property on Access tables and/or queries to prevent them from being overwritten by import wizards? Any Access database can be easily destroyed if a user mistakenly...
8
by: Smartin | last post by:
I have a form in Access97 which facilitates a query against a production Access database. Users will enter some search terms and see a datasheet view of the results in a subform. The prod table is...
1
by: simho3000 | last post by:
Hi, I don't think my mind in good shape on this today, really need your expert on this I got two simple tables without key Table A has 2 fields, Date and volume, e.g. 1/May/05 and the actual...
2
by: GreyGeek | last post by:
I export data from a table that contains a varchar field that stores whole names in it. Some of the names include the apostrophe character.... O'Neal, etc... When I attempt to import the data...
0
by: jehrich | last post by:
Hi Everyone, I am a bit of a hobby programmer (read newbie), and I have been searching for a solution to a SQL problem for a recent pet project. I discovered that there are a number of brilliant...
1
by: bbatson | last post by:
Hello, Does anyone know how to prevent the creation of an import errors table when importing data from an external source such as Microsoft Excel? Thanks!
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.