473,385 Members | 1,720 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

How to protect the tables of my msAccess without enabling the group level security?

41 32bit
In my small application (msAccess VBA), I don't want to criate group users, but would like to protect the tables, so nobody else can see them or even import the information.
Is it possible?

Best Regards
Ricardo
Jan 31 '11 #1

✓ answered by ADezii

You can make Tables invisible to your Users so that they will never know that they exist, and at the same time making the process irreversible:
  1. In the Database Window, select a Table to make Invisible.
  2. Right-Click ==> Properties ==> Select Hidden (under Attributes).
  3. Tools ==> Options ==> View Tab ==> Under View Group, uncheck Hidden Objects.
  4. As an Option, you can also disable the Tools ==> Options Menu, so that a User cannot reverse this process.
  5. Now, the Table(s) will not be Visible in the Tables Tab of the Database Window, and the average User will never know that they exist.
  6. This is by no means foolproof, but minimally provides some security as far as seeing the Table(s).

6 2133
Rabbit
12,516 Expert Mod 8TB
If you're trying to protect it from external threats, you can just encrypt the database. If you're trying to protect it from internal threats, there's not much you can do except obsfucate the data.
Jan 31 '11 #2
ADezii
8,834 Expert 8TB
You can make Tables invisible to your Users so that they will never know that they exist, and at the same time making the process irreversible:
  1. In the Database Window, select a Table to make Invisible.
  2. Right-Click ==> Properties ==> Select Hidden (under Attributes).
  3. Tools ==> Options ==> View Tab ==> Under View Group, uncheck Hidden Objects.
  4. As an Option, you can also disable the Tools ==> Options Menu, so that a User cannot reverse this process.
  5. Now, the Table(s) will not be Visible in the Tables Tab of the Database Window, and the average User will never know that they exist.
  6. This is by no means foolproof, but minimally provides some security as far as seeing the Table(s).
Jan 31 '11 #3
Ricardo de Mila
41 32bit
Thank you... It solves my problem for a while.
Best Regards
Ricardo de Milano
Feb 1 '11 #4
Ricardo de Mila
41 32bit
Dear Rabbit...
What you mean when you speak about external threats and internal threats?
My main question is the following:
Let's say I have a hidden table in my file with all the preventions ADezii has mentioned. But I understand that another file made in vba would still continue to have acces to my file even listing the application.tables.items.names and everthing else using the same process.
How can I prevent that?
I told me about the encryption.
Will I have problems with the VBA if I encrypt my data?
Let's say that in a field I have the content "RICARDO". When encrypting, the information would be something like (let's say) "XYARZSK". But In my VBA if I use (for instance) an instruction dlookup, will it read "RICARDO"? I mean the encryption process is totally transparent to VBA?

Best Regards
Ricardo de Milano
Jun 30 '14 #5
Rabbit
12,516 Expert Mod 8TB
1) An external threat is a person you don't intend to have access to your database. An internal threat is a person you intend to have access to your database.

2) You can't prevent someone from undoing your protections. Access is not secure. If you need real security, you shouldn't use Access.

3) If what you want is to prevent people from seeing a table, encryption will do nothing for you. Encryption is to prevent someone from reading the data in plain text. It does nothing to prevent someone from even seeing the data.

4) Any encryption you implement in Access will not be transparent to VBA, the VBA will need to be modified to use the encryption code.
Jun 30 '14 #6
NeoPa
32,556 Expert Mod 16PB
It's quite easy for a developer to get around, but I like to store my data in a BE DB that is password protected. Without the password a user can only access the data via the FE. ADezii's approach will help to keep the linked tables obscured for most users.
Jun 30 '14 #7

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: gregory.sharrow | last post by:
I need to secure a datawarehouse table at the row level based on 1 to many keys on that table. A user should only see the rows they have access to. I need to be able to figure out which rows they...
2
by: robert | last post by:
well, talk about timely. i'm tasked to implement a security feature, and would rather do so in the database than the application code. the application is generally Oracle, but sometimes DB2. ...
3
by: Br | last post by:
I'm going to go into a fair bit of detail as I'm hoping my methods may be of assistance to anyone else wanting to implement something similar (or totally confusing:) One of systems I've...
4
by: mrouleau | last post by:
I am sorry if this is the wrong group to ask, if so please point me in the correct direction. My problem is I have an MDB file with user-level security on it (mdw). When i move it over to a...
2
by: Sid | last post by:
I hope somebody could help me with this. I have a access database which includes some forms, queries and tables. Once I upload it on to the office network, I was hoping if I could set up...
7
by: cefrancke | last post by:
I have a few tables with sensitive user information (passwords, etc.) and I would like to prevent someone from opening a blank database and importing those tables. Is there a way to "hide" or...
1
by: Luke Bailey | last post by:
I have an access database that I have secured using ueser-level security. I have my own logon in the Admins group. I have also removed Admin from the Admins group so that the standard end-user...
2
by: evenlater | last post by:
I realize that user level security is not available for Access databases in the new AK27 format .accdb, and I know that I can still utilize ULS by making my database an .mdb file. But I'm...
0
by: milbot | last post by:
Hi, I am trying to set-up a database and have decided to implement the built-in user level security to satisfy my security requirements. I was wondering if it were possible to restrict users to...
6
by: plaguna | last post by:
Basically I have Three questions about Jet U-L Security: 1.Every time I create new Groups, new Users and Permissions using the User and Group Accounts dialog box, It creates User security for...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.