HI:
I have designed an MSAccess 2010 DB to handle Mainteniance Work Orders , it has tables like WorkOrder, employees, equipment,department to load mainteniance help request,there are like "customers" who ask for help and "suppliers" ( mainteniance personel that supply the help) , using VBA the app checks the ENVIRON("UserName")and based on this UserName and through VBA ,forms and fields are enable/ disable, visible /invisibe depeding on user job position and privileges, I use a Back End DB where tables are located and a Front End DB where queries, forms reports and VBA code are stored, also I save the front end as .accdr that is a run time version of the app so people can't see the code behind , at this point every thing is fine, but in order to allow all user to read / write to the Back End DB I needed to gave them read/ write permisions in the Back End folder, and ultimatelly if they discover where the back end is located they can get in and mess with the data tables, this is not a supercritical data , but I'm worried that being willing or not somebody can go in and mess up the data, so I wondering if there is a way to set a password for the Back End and then using code in Front End log In so in case they want to open Back end without using the front end log in they can't access
thanks for all your help
1 1681
Hi, i will share with you some of the things i do with my back end databases, you might find them useful you may not... - Save the database in a hidden shared folder (using a $ after the share name means it cannot be found unless you know what it is)
- Write an autoexec macro/startup form that runs a docmd.quit unless you have set a command line flag (i'll let you google that if you dont know of it, but essentially, you create a shortcut with /cmd "letmeinplease" or whatever you want and unless this is supplied the database wil quit, and of course only you will know what it is
- Make all the tables in the database hidden, so that they cannot be imported into a new database (unless you unhide them)
I'm sure there are better methods, but i found using a database password too frustrating, you have to code the password into an ODBC connection or something, i cant quite remember, havent looked at that in years.
Good luck
Sign in to post your reply or Sign up for a free account.
Similar topics
by: BijuThomas |
last post by:
Complicated - ASP/Security/data transfer/XML doubt
In our company Head office we are hosting an intranet
server in IIS (Windows 2000) , ASP and Sqlserver back
end.
We are maintaining our branch...
|
by: Beatrice Rutger |
last post by:
Hi,
I am a previous Micro$oft desertee (moved from VB/VC++ to Java before
this whole DOTNET thing) because I had several issues with Micro$oft. I
am not completely in love with Windoze, but I...
|
by: Kim Noer |
last post by:
Hi there ...
I'm having some troubles getting a form posted back to a frame, which was
the 'launching' page to the popup.
Ie. I want to get 'thanksabunch.asp' to post back to the frame1...
|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data...
|
by: Marina |
last post by:
Hi,
I am trying to find the minimum security settings to allow a windows control
embedded in IE have full trust.
If I give the entire Intranet zone full trust, this works. However, this is...
|
by: Robbie Wallis |
last post by:
Hello,
Could anyone provide me with an idea of the impact that the following change
would make to security
Modifying the machine.config file and set the "allowDefinition" attribute to...
|
by: nvv via DotNetMonster.com |
last post by:
Hi,
I am working on a web site which authenticates an user using forms. And once they logout, I observed that, for any reason if they click on "BACK" button of the browser, the user is being taken...
|
by: QLD_AU |
last post by:
Has anyone found a way of listing back security groups only using
System.DirectoryServices ?
I have found heaps of references to finding what group a user is, however i
am trying to just find a...
|
by: Rob |
last post by:
Hi,
We have a MS Access front-end connecting to a SQL Server back-end. We
use an ODBC connection using NT authentication, however the audit
problem we have is that a user has the security to run...
|
by: Joseph Geretz |
last post by:
We use a Soap Header to pass a token class (m_Token) back and forth with
authenticated session information. Given the following implementation for
our Logout method, I vastly prefer to simply code...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
| |