473,378 Members | 1,555 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Front End/Back End Security

I created an Access Database and added the Security thru the Securtiy wizard. Then Split the database into the fe and be files, however, the security did not stay with the .be file. Is there a way to prevent random people from accessing the .be file and/or tables? or by creating security on the .be, will it give me problems with running queries on the front end?

Can anyone help?

Thanks,

Matt
Apr 14 '08 #1
1 1408
Did you create a new workgroup first?
If not, you are editting the default system.mdw file. Then even i can enter your "secure" database when you use the default.

Create a new workgroup file.
Using this new workgroup file, open a new database
Import all objects from the old, unsecure FE database into this new database.
Do the same for your BE.

Add users and permissions. Now you are secure.

HTH:D
May 30 '08 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

12
by: Corey Burnett | last post by:
I have a client that has a split database (front-end/back-end). They are also using Access security - MDW file. The front end MDE file, the back end MDB file, and the MDW file are all located on...
2
by: Freeserve | last post by:
Not sure whether this is the right group, but I can't find anything in the ..NET groups and my apologies if this has already been covered or is considered "off subject". I am looking at using an...
5
by: RO|_F | last post by:
Hello, Does anybody know if there are programs which do the following: Act as 'front end' of a database (preferrably MS Access) Encrypts or converts the contents of the database so that data is...
4
by: Jay Mack | last post by:
Hello, I converted an Access application that used to have a MDE front-end (distributed to each user) with a MDB back-end on a share. It now has a MDE front-end with linked ODBC SQL Server 2000...
4
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+...
3
by: rdemyan via AccessMonster.com | last post by:
I'm thinking about providing a relatively easy method for users to restore the front end from a backup. The purpose is to allow for restoring if the front end becomes corrupt. Here are some...
4
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a...
1
by: abprules | last post by:
Help!!! This is driving me nuts! We have created a DB for a company. We split the DB. Everything seems to work well except for this one thing. Every time we refresh the front end of a user,...
3
by: adjo | last post by:
I have used Access frontend with SqlServer backend combination for a number of years. In the easy 'oldfashioned' way using DAO and odbc linked tables. Works fine within limits. Now I'm facing the...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.