473,396 Members | 1,827 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

access security

Hello all,

I have a scenario where the database users can see all the records in the table/form but can only edit their records (which are relevant to them ,for example I have a field which stores the names of the users).

In other words they should be able to edit only their records which is identified by their name field .

Any ideas or suggestions ?

Gana
Apr 2 '08 #1
2 951
jeffstl
432 Expert 256MB
Hello all,

I have a scenario where the database users can see all the records in the table/form but can only edit their records (which are relevant to them ,for example I have a field which stores the names of the users).

In other words they should be able to edit only their records which is identified by their name field .

Any ideas or suggestions ?

Gana
That will all come down to the query you use to pull up the relevant records.

I am not sure how you are doing your binding or reading of the data but you will need to use the User Name to determine which records they can see.

Hopefully you have a column in your table that identifies the relevant user? If not I am not sure how you would do this.

Expand|Select|Wrap|Line Numbers
  1. Select * from MyRecords, MyUsers where MyUsers.user_name = MyRecords.user_name
  2.  
If you don't have a joining table like that you can just pass the user name into your query then

Expand|Select|Wrap|Line Numbers
  1. Select * from MyRecords where user_name = '" & UserName & "'"
  2.  
Apr 2 '08 #2
That will all come down to the query you use to pull up the relevant records.

I am not sure how you are doing your binding or reading of the data but you will need to use the User Name to determine which records they can see.

Hopefully you have a column in your table that identifies the relevant user? If not I am not sure how you would do this.

Expand|Select|Wrap|Line Numbers
  1. Select * from MyRecords, MyUsers where MyUsers.user_name = MyRecords.user_name
  2.  
If you don't have a joining table like that you can just pass the user name into your query then

Expand|Select|Wrap|Line Numbers
  1. Select * from MyRecords where user_name = '" & UserName & "'"
  2.  
Hi Jeffstl,

Thanks for responding . I have a username field so as you said I want to restrict the users by username , so that a user with the same username as in the records can edit . Is the solution you gave applies ? But he should be able to see all the other records and edit only their records .

Gana1234
Apr 2 '08 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

32
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get...
13
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling...
7
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the...
11
by: Will | last post by:
I am looking at using a table with user names, passwords and user rights, which I would administer. I have read a lot about the shortfalls of this and the lack of security but the customer does...
3
by: mar10 | last post by:
I am creating a database in Access 2002 for a small firm that would like security on the tables. They want some employees to have write access only to tables, while others read-only. I have not...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
17
by: DaveG | last post by:
Hi all I am planning on writing a stock and accounts program for the family business, I understand this is likely to take close to 2 years to accomplish. The stock is likely to run into over a...
38
by: Oldie | last post by:
I have built an MS Access Application under MS Office XP (but I also own MS Office 2000). I have split the application in the pure database tables and all the queries, forms, reports and macro's. ...
23
by: Reggie | last post by:
Hi and TIA. I developed several A2K dbs which are now being run on my clients computer which have been upgraded to Access 03. I'm not sure exactly what they mean but of you know or could point me...
7
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. ...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.