473,396 Members | 2,089 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Back End DB security doubt

47
HI:
I have designed an MSAccess 2010 DB to handle Mainteniance Work Orders , it has tables like WorkOrder, employees, equipment,department to load mainteniance help request,there are like "customers" who ask for help and "suppliers" ( mainteniance personel that supply the help) , using VBA the app checks the ENVIRON("UserName")and based on this UserName and through VBA ,forms and fields are enable/ disable, visible /invisibe depeding on user job position and privileges, I use a Back End DB where tables are located and a Front End DB where queries, forms reports and VBA code are stored, also I save the front end as .accdr that is a run time version of the app so people can't see the code behind , at this point every thing is fine, but in order to allow all user to read / write to the Back End DB I needed to gave them read/ write permisions in the Back End folder, and ultimatelly if they discover where the back end is located they can get in and mess with the data tables, this is not a supercritical data , but I'm worried that being willing or not somebody can go in and mess up the data, so I wondering if there is a way to set a password for the Back End and then using code in Front End log In so in case they want to open Back end without using the front end log in they can't access

thanks for all your help
Jun 13 '12 #1
1 1681
Dan2kx
365 100+
Hi, i will share with you some of the things i do with my back end databases, you might find them useful you may not...
  1. Save the database in a hidden shared folder (using a $ after the share name means it cannot be found unless you know what it is)
  2. Write an autoexec macro/startup form that runs a docmd.quit unless you have set a command line flag (i'll let you google that if you dont know of it, but essentially, you create a shortcut with /cmd "letmeinplease" or whatever you want and unless this is supplied the database wil quit, and of course only you will know what it is
  3. Make all the tables in the database hidden, so that they cannot be imported into a new database (unless you unhide them)
I'm sure there are better methods, but i found using a database password too frustrating, you have to code the password into an ODBC connection or something, i cant quite remember, havent looked at that in years.

Good luck
Jun 15 '12 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: BijuThomas | last post by:
Complicated - ASP/Security/data transfer/XML doubt In our company Head office we are hosting an intranet server in IIS (Windows 2000) , ASP and Sqlserver back end. We are maintaining our branch...
8
by: Beatrice Rutger | last post by:
Hi, I am a previous Micro$oft desertee (moved from VB/VC++ to Java before this whole DOTNET thing) because I had several issues with Micro$oft. I am not completely in love with Windoze, but I...
2
by: Kim Noer | last post by:
Hi there ... I'm having some troubles getting a form posted back to a frame, which was the 'launching' page to the popup. Ie. I want to get 'thanksabunch.asp' to post back to the frame1...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
16
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is...
1
by: Robbie Wallis | last post by:
Hello, Could anyone provide me with an idea of the impact that the following change would make to security Modifying the machine.config file and set the "allowDefinition" attribute to...
2
by: nvv via DotNetMonster.com | last post by:
Hi, I am working on a web site which authenticates an user using forms. And once they logout, I observed that, for any reason if they click on "BACK" button of the browser, the user is being taken...
0
by: QLD_AU | last post by:
Has anyone found a way of listing back security groups only using System.DirectoryServices ? I have found heaps of references to finding what group a user is, however i am trying to just find a...
2
by: Rob | last post by:
Hi, We have a MS Access front-end connecting to a SQL Server back-end. We use an ODBC connection using NT authentication, however the audit problem we have is that a user has the security to run...
4
by: Joseph Geretz | last post by:
We use a Soap Header to pass a token class (m_Token) back and forth with authenticated session information. Given the following implementation for our Logout method, I vastly prefer to simply code...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.