473,386 Members | 2,114 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Removing MDW security

If a person has a MDB secured with user-level security that uses an MDW,
what steps does one take to fully remove the user-level security.
Oct 16 '08 #1
3 12804
On Wed, 15 Oct 2008 20:02:34 -0700, Salad <oi*@vinegar.comwrote:

It's in the Security FAQ available on microsoft.com:

34. How can I "de-secure" a database?
You must have Administer permissions and/or be a member of the Admins
group in the workgroup information file that the database was secured
with. Grant full permissions to the Users group and the Admin user
account. Put the Admin user back in the Admins group and remove the
password from the Admin user. You will not be prompted for a logon ID
and password once the password is removed from the Admin user.
Optionally, you can also run the Security Wizard again to transfer
ownership of all objects back to the Admin user, but the wizard will
also remove permissions from the Users group, which you may not want.

-Tom.

>If a person has a MDB secured with user-level security that uses an MDW,
what steps does one take to fully remove the user-level security.
Oct 16 '08 #2
"Tom van Stiphout" <to*************@cox.netwrote in message
news:oa********************************@4ax.com...
On Wed, 15 Oct 2008 20:02:34 -0700, Salad <oi*@vinegar.comwrote:

Optionally, you can also run the Security Wizard again to transfer
ownership of all objects back to the Admin user, but the wizard will
also remove permissions from the Users group, which you may not want.
And if you'd rather not run the wizard (and who would want to? ;) ) then, as
a final step, import all objects into a new blank mdb file.

Keith.
www.keithwilby.co.uk

Oct 16 '08 #3
Keith Wilby wrote:
"Tom van Stiphout" <to*************@cox.netwrote in message
news:oa********************************@4ax.com...
>On Wed, 15 Oct 2008 20:02:34 -0700, Salad <oi*@vinegar.comwrote:

Optionally, you can also run the Security Wizard again to transfer
ownership of all objects back to the Admin user, but the wizard will
also remove permissions from the Users group, which you may not want.

And if you'd rather not run the wizard (and who would want to? ;) )
then, as a final step, import all objects into a new blank mdb file.

Keith.
www.keithwilby.co.uk
Thank, Keith and Tom
Oct 16 '08 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
1
by: xmp333 | last post by:
Hi, I created an Access XP database, and then disabled all the menus that allowed users to modify report design, etc... (I'll call them administrative features). Users were only able to use...
0
by: -Michelle- | last post by:
Hi Before anyone blasts me for posting a question that the solution clearly appears in the help file, please read on. I keep getting the Security Warning : Opening.. x database may not be...
3
by: patcho | last post by:
Hello, I have a problem that I was hoping to get some assistance with. I have built a split database (back end with all the tables and a password to protect the information & a front end to link...
4
by: Ant | last post by:
I am trying to apply security to a database I have just finished. The application is split into a back end of tables and a front end of forms etc. I need some users to have access to forms based on...
9
by: John Stemper | last post by:
I've recently moved an ASP.Net app to our deployment server after it was verified on our integration test server. On the deployment server I am now getting the following error:...
7
by: Stephen | last post by:
I have my intranet setup on our web server. It contains multiple applications, but none are set up in the default application pools. In other words, I create a webform and plop it into a...
1
by: gafchic | last post by:
I have inherited a db at my workplace which has security on it. I would like to remove the security from it. I can logon to the database with an account that is in the admins, full permissions and...
1
by: Luke Bailey | last post by:
I have an access database that I have secured using ueser-level security. I have my own logon in the Admins group. I have also removed Admin from the Admins group so that the standard end-user...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.