473,326 Members | 2,010 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,326 software developers and data experts.

Access 2003: Thinking about going multiuser with user security,...

PW
Any suggestions, knowledge base articles, books? We are not going to
go field level but now we have a couple clients that would like to
limit what employees can see of our application (forms and reports). I
guess we would need to create a database containing user names and
what forms and reports they can access (and then probably going to
have to be responsible for that database too <g>.?

Thanks,

-paulw
Dec 7 '07 #1
7 4215
PW
On Thu, 06 Dec 2007 20:39:25 -0700, PW
<pa**********************@removehotmail.comwrote :
>Any suggestions, knowledge base articles, books? We are not going to
go field level but now we have a couple clients that would like to
limit what employees can see of our application (forms and reports). I
guess we would need to create a database containing user names and
what forms and reports they can access (and then probably going to
have to be responsible for that database too <g>.?

Thanks,

-paulw

We most likely will also want to log who made what changes to what
record and when.
Dec 7 '07 #2

"PW" <pa**********************@removehotmail.comwrote in message
news:jq********************************@4ax.com...
Any suggestions, knowledge base articles, books? We are not going to
go field level but now we have a couple clients that would like to
limit what employees can see of our application (forms and reports). I
guess we would need to create a database containing user names and
what forms and reports they can access (and then probably going to
have to be responsible for that database too <g>.?
Any self-implemented security is, at best, "security lite", and more
commonly, "security not at all" because it can be so easily defeated by
someone who knows Access even moderately well. Even though it is "fallible"
(as is, to a great extent, any security system that a penetrator can get
his/her hands on), Access' user/group level security is much less easy to
break. That is still available in Access 2003, and even in Access 2007 for
MDB / MDE databases. It is not available for the Access 2007-specific ACCDB
databases.

Larry Linson
Microsoft Access MVP
Dec 7 '07 #3
Fester Bestertester previously wrote:
5. Read through some tutorials about User Level Security and walk
through the ULS Wizard a bunch of times. Then do some more reading and
research. Creating a workgroup security file that's specific to one
particular application, and does not affect all Access sessions on a
machine, is a little tricky.
Here's a good MS FAQ page on creating a security file that is specific
to a particular database or application (I believe this also applies in
Access 2003):

http://support.microsoft.com/default...#_Toc493299688
Dec 7 '07 #4
lyle fairfield wrote:
Many developers do almost none of the above, with the exception of
splitting their applications.
I am one of them.
Hmmm...raises an interesting point for discussion. Seems that at the
very least I'd want to deploy the application with some kind of failsafe
mechanism, so that if the back end data file got moved, the front end
had some reasonably elegant way of restoring the links without requiring
developer intervention. At the most, it would require 1 minute of time
from a system administrator who knew the correct path for the backend
and could point the app there. That's probably why the Verify Links
modules have been adopted so widely. Why re-invent the wheel when it's
already out there?

As far as the other stuff goes, setting up a specific security file for
that app might make for an inconvenience for the users, since they have
to remember a separate username and password for the application. But I
can't imagine allowing users to go in and monkey around with the design
of the app. So it seems that, again at the very least, you'd want to
turn off all or most of the startup options.

Also, one other caveat. I recall seeing a lot of issues a few years back
when developers tried to deploy a split front/back database, but where
there were multiple versions of Access installed on the various
workstations, especially 97 vs. 2000. What I learned from that was that,
as a general rule, it's a good idea to migrate everybody altogether from
one version of Office to the next before deploying an application. Just
to be on the safe side.

Have you really deployed split apps with no security and no front
end/back end verification and no startup options turned off? No troubles
with that?

Dec 7 '07 #5
PW <pa**********************@removehotmail.comwrote :
>We most likely will also want to log who made what changes to what
record and when.
There's a simple example at
ACC2000: How to Create an Audit Trail of Record Changes in a Form
http://support.microsoft.com/default...;en-us;Q197592

Audit Trail - Log changes at the record level at:
http://allenbrowne.com/AppAudit.html
The article addresses edits, inserts, and deletes for a form and subform.

Modules: Maintain a history of changes
http://www.mvps.org/access/modules/mdl0021.htm
The History Table routine is designed to write history records that track the changes
made to fields in one or more tables.

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems at
http://www.granite.ab.ca/accsmstr.htm
Tony's Microsoft Access Blog - http://msmvps.com/blogs/access/
Dec 8 '07 #6
PW
On Sat, 08 Dec 2007 01:18:51 GMT, "Tony Toews [MVP]"
<tt****@telusplanet.netwrote:
>PW <pa**********************@removehotmail.comwrote :
>>We most likely will also want to log who made what changes to what
record and when.

There's a simple example at
ACC2000: How to Create an Audit Trail of Record Changes in a Form
http://support.microsoft.com/default...;en-us;Q197592

Audit Trail - Log changes at the record level at:
http://allenbrowne.com/AppAudit.html
The article addresses edits, inserts, and deletes for a form and subform.

Modules: Maintain a history of changes
http://www.mvps.org/access/modules/mdl0021.htm
The History Table routine is designed to write history records that track the changes
made to fields in one or more tables.

Tony

Thanks Tony!

-paulw
Dec 8 '07 #7
Tony Toews [MVP] wrote:
Audit Trail - Log changes at the record level at:
http://allenbrowne.com/AppAudit.html
The article addresses edits, inserts, and deletes for a form and subform.
This is really nice, I just tested it in an Access 2003 split app/db and
it works great. Thanks to Alan!
Dec 8 '07 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Vic | last post by:
Dear All, I have been developing a small access database, but I am new to security concepts with access. This is a multiuser database, I have a table which will be written by various users...
13
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling...
2
by: Jennifer B. | last post by:
Hi Every Body: I hope this is to the right post. I apologize if I am incorrect. Could anyone please answer one or any of the following questions for Access 2003: - Maximum size of an...
1
by: jy | last post by:
I have converted my Access database into *.mde format. However, my colleague can’t seem to open the file. The message shows that another user has opened it in exclusive mode. However, the file is...
4
by: Pecanfan | last post by:
I've got quite a large database which is totally form-driven at the moment. I now need to allow multiple users access to various parts of it and, frankly, I'm not prepared waste my time with...
15
by: Cheryl Langdon | last post by:
Hello everyone, This is my first attempt at getting help in this manner. Please forgive me if this is an inappropriate request. I suddenly find myself in urgent need of instruction on how to...
3
by: jofo | last post by:
Hello all, I am working on a multiuser access db. I want to have people login and then store their user information in an object. I want to store the information because it will be used in...
17
by: Mell via AccessMonster.com | last post by:
Is there a way to find out where an application was created from? i.e. - work or home i.e. - if application sits on a (work) server/network, the IT people know the application is sitting...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
1
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.