473,388 Members | 1,552 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,388 software developers and data experts.

Access Security - Secure Logins

43
From what I have been reading, user level security is not available on Access 2007 and newer unless you have converted the database from an earlier version that does have it.

How good is the security if this step is taken (to convert from an older versoin)? In that case, would the username and password be automatically encrypted across the network if a 2007 or 2010 database was set up on a server with local user clients on individual machines?

If not, I'm thinking the best approach would be to use ODBC and SSL with Microsoft SQL Server or some other database server in order to achieve an encrypted data stream across the network.

Another approach I'm wondering about is to set up a password/username table (hidden table) on the shared database server file and use it for logins. How secure would that be?

Does anyone really use Access where stringent security measures are needed?

Thanks!
Jan 4 '12 #1
3 1368
Rabbit
12,516 Expert Mod 8TB
If you need real security, forget Access and go with an Enterprise solution like SQL Server. I'm sure there are people who use Access where stringent security measures are needed but they are asking for a whole heap of trouble because Access is not secure at all and there's very little you can do to change that.
Jan 4 '12 #2
Sedrick
43
Thanks Rabbit,

You know, I was just thinking of something. If a 2007 or 2010 database is encrypted and split then you have the following. An encrypted .accdb file and an encypted front-end (I see from the Microsoft site that both the front-end and the back-end databases should be encrypted) http://office.microsoft.com/en-us/ac...010096299.aspx

When you have an encrypted .accdb file just setting there then I would assume that it is like any other data file - it stores things and lets the program do the processing.

So unless it is different than most data files, and just setting there being read from and written to, then it would seem like anything that goes across the network would go across encrypted, just as it was read or written.

When you set a database password on it, for example, which end does the processsing occur on to see if the password is correct or not? Seems like it would be on the front-end.

Does anyone know for sure?
Jan 4 '12 #3
NeoPa
32,556 Expert Mod 16PB
Sedrick:
Does anyone really use Access where stringent security measures are needed?
Not that I know of. Frankly it was always pretty useless or, if used properly, pretty complicated and quite messy to use (It involved horrible manipulation of the setting of where to find the MDW file etc). It was probably a bad move to get rid of it the way they did, but never something I'd recommend people work with.
Jan 5 '12 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: Brian Loesgen | last post by:
The next San Diego .Net User Group meeting is Tuesday, November 25, 2003 at the Scripps Ranch Library. Scripps Ranch Library 10301 Scripps Lake Drive San Diego, CA 92131-1026 Please join us...
2
by: John J. Hughes II | last post by:
I am having some major problem with maintaining security for my windows application to the SQL. Currently my application access the SQL using System.Data.SqlClient and all forms use stored...
32
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get...
11
by: Will | last post by:
I am looking at using a table with user names, passwords and user rights, which I would administer. I have read a lot about the shortfalls of this and the lack of security but the customer does...
4
by: ugo_lavoie | last post by:
Hi there, i'm doing a databse right now and i want it to be secure, about 20-30 people (max) will be using it and it will be on a SQL server. My first question: I saw some web page about adding...
3
by: mar10 | last post by:
I'm working on a database for a local business that requires different security for different individuals. There is one PC at the front desk and several individuals will be working with the...
5
by: Greg Strong | last post by:
Hello All, What are the best ways to implement security for Access databases (i.e. ..MDB files)? I ask the question from a general perspective. Why? Well I had written a prototype database...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
1
by: Jeremy S. | last post by:
..NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a ..NET Windows Forms application can be...
7
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.