473,396 Members | 1,826 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

MS Access Security Troubleshooting Guide

Existing Access Database Troubleshooting

I am new to access database and inherited an access application and
all users who were previously able to use this access file
simulataneously are now locked out exclusively . Some have not been
able to get on at all. Obviously, this is the problem, and as far as I
know, no changes have been made to access backend or front end. I have
no historical data as to whether or not the access db was secured
previously,..)

This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network. How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.

If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)

I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file. However, I
do not know what to anticipate breaking if I recreated one, ... and
just wanted to see if any thoughts could be shared on this.

Any guidance as to how to troubleshoot an application on a network
share would be appreciated.

Nov 1 '07 #1
2 2450
siewong wrote:
Existing Access Database Troubleshooting

I am new to access database and inherited an access application and
all users who were previously able to use this access file
simulataneously are now locked out exclusively. Some have not been
able to get on at all. Obviously, this is the problem, and as far as I
know, no changes have been made to access backend or front end. I have
no historical data as to whether or not the access db was secured
previously,..)
Could you describe the situation a bit more? What do you mean, locked
out exclusively? Is there an error message displayed? What is the
error number or description?

It sounds like some can get in and others can't. What's the difference
between the two? Have you looked at the desktop icon on the machines
that work and those that don't?

>
This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network. How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.

If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)

I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file. However, I
do not know what to anticipate breaking if I recreated one, ... and
just wanted to see if any thoughts could be shared on this.

Any guidance as to how to troubleshoot an application on a network
share would be appreciated.
Nov 2 '07 #2
"siewong" <wo*****@gmail.comwrote in message
news:11*********************@57g2000hsv.googlegrou ps.com...
Existing Access Database Troubleshooting

This access db is on a network share, and i have no knowledge if it's
verifying against a .mdw file on the network or on a computer
somewhere on a network.
If you can open the file directly from an explorer window then either:

the file has not been secured correctly

or

you are joined to the custom workgroup.

The latter is not recommended, rather you (and your users) should switch to
custom workgroups on a session-by-session basis.
How would one determine where the access
database looks to to verify if a users are in a certain workgroup?
If users are joined to the default "system.mdw" workgroup then the would
need a shortcut with a valid "/wrkgrp" switch to gain access to the file.
I've gone through most of the menu options on the access database and
couldn't find one that would show me where it references for it's
workgroup information model it uses.
No, you won't find it there. The developer should have this information,
not much help to you I know.
>
If I were to recreate a new workgroup information file with this
accesss dataabase, should I be concerned about overriding any other
configuration that access may reference from a previously created file
(if one existed, and if somehow, it's referencing an existing file..?
or would this corrupt the access database.. ?)
Access will only "reference" the workgroup file you tell it to. By default
this is "system.mdw". You join other workgroups either using the workgroup
admin menu option or by using a shortcut.
>
I have downloaded the FAQ Security Access and reading through it to
understand what I need to do to recreate a workgroup file.
You can only recreate a workgroup file if you have *exactly* the same
information that was used to create the original. It wouldn't be much in
the way of security if you could easily recreate workgroup files with
minimal information.

There's a security example on my website that might help you understand the
concept (in addition to the FAQ).

HTH - Keith.
www.keithwilby.com

Nov 2 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: John | last post by:
Hi We have an access app (front-end+backend) running on the company network. I am trying to setup replication for laptop users who go into field and need the data synched between their laptops...
4
by: RM | last post by:
Had VS .Net 2002 installed on W2k Server SP3 and supported a number of web sites. Installed VS .Net 2003 on Friday and now all web sites using .Net & MS ACCESS get this strange error upon open. ...
9
by: Stan | last post by:
Here is my scenario: Web server ------------ Framework 1.1 Application proxy for the serviced component Component server ------------------- Framework 1.0
5
by: Norsoft | last post by:
I have a .Net 1.1 application which is downloaded into an aspx page. It is a dll which inherits from System.Windows.Forms.UserControl. It works fine on a PC with only the 1.1 Framework. However,...
5
by: Mitchell S. Honnert | last post by:
Is there a way, given the full path of a folder on a network, that one can programatically tell if you have Read access to that folder? I have an application where the user is able to select a...
7
by: Peter Ritchie | last post by:
I'm writing a Web Service and I would like to add performance counter data for monitoring performance of the Web Service's operations over time and load. The problem is, I get the "Requested...
7
by: Visitor No 3 | last post by:
My local Crinkles group(U3A), of which I am one, want me to develop a noddy database and web site for their members. Some are computer literate, others not so. I thought an Access 2000 .mdb on a...
12
by: Dr. Edmund M. Hayes | last post by:
I wrote a access program that works well enough that a handful of people would like to buy it from me. My problem is that if I sell it to someone there is no mechanism that I know of to protect...
8
by: =?Utf-8?B?TWFuanJlZSBHYXJn?= | last post by:
Hi, I created a web service and hosted it in Windows Services. It is working fine. Now I am trying to implement the X509 certificates for message layer security. But it is throwing the following...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.