473,487 Members | 2,622 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

FE/BE Queries, Forms and Reports Based on Location

3 New Member
I have a database that needs to be deployed to a kiosk for civilian drivers. The Data is HIPPA Related and needs to be restricted to that individuals needs. However it all has to come together in singular data. The Terminal would be accessed by 12 individuals Daily with different data sets. Their use would be approximately 10 minutes a day. The system is deployed on a networked drive. Basically what I need to do is limit access to client information to the transport drivers by county. Is there a way to use the query's already built into my system through VBA code to restrict viewing of data in the main system? Reports also need to be based of the specific employee so that they are limited in undoing data integrity. I plan on implementing a user password login system with privledges but not sure how to restrict data the query's produce and reports.
Jan 31 '13 #1
11 1909
Rabbit
12,516 Recognized Expert Moderator MVP
In terms of security, Access is one of the least secure options available. Anything you can do to secure the data can be undone by an experienced user. For example, you can easily bypass all code by holding down the shift key when opening the database.

If security is a real high priority, you should look at enterprise solutions. If Access is all you have to work with, the best you can do is to bring the security to a level at which only very advanced users can bypass all the security.

You can read this article for some ideas on implementing security.
http://bytes.com/topic/access/insigh...atabase-access
Jan 31 '13 #2
jdoathout
3 New Member
Rabbit, Read the article and is great but I dont think it addresses my needs. I am thinking I am going to have to set up variables and some how use those variables in the query as a show or don't show based on user ID? Not sure how to implement this though. Unfortunately yes, this is a government run hospital transportation system and only available through access. I have mentioned other options but government is set in its ways I guess. If you know how I might implement variables to achieve my needs please feel free to send me something.
Jan 31 '13 #3
Rabbit
12,516 Recognized Expert Moderator MVP
As far as filtering data in a query, you can use parameters and the WHERE clause of a SQL query.

Whether or not that provides any form of security is another question. (The answer is no, too easy to get around)
Jan 31 '13 #4
jdoathout
3 New Member
http://msdn.microsoft.com/en-us/libr...ffice.12).aspx

Think this is something like what I am trying to achieve. Not sure, will have to experiment.
Jan 31 '13 #5
Rabbit
12,516 Recognized Expert Moderator MVP
What path you take depends on the specifics. There are a dozen ways to filter queries.
Jan 31 '13 #6
zmbd
5,501 Recognized Expert Moderator Expert
jdoathout:
What you are attempting to do with "User Level" access was removed with V2010 and wasn't the best in the earlier versions of Access as anyone with the correct (and all too often easily obtained) workspace information could bypass the security. You need something like SQLServer, MYSQL, or ORACLE as Rabbit suggested to begin with. I think even even SQL-ServerExpress might be more secure; however, I've never looked into its functionality.

With that said, following the link given by Rabbit should be your very first step. YOU MUST UNDERSTAND THE INFORMATION PROVIDED by Rabbit FIRST.Very little, if any of your efforts with queries, forms, vba, etc.. will do you any good at all in securing the database until you understand that information!

Next, you will need to find a way to encrypt the very sensitive data such as: 37.AES Encryption Algorithm for VBA and VBScript

You will also want to split the front and backends along with password/encryption. This can be somewhat difficult and a few different ways to accomplish.

The remainder is somewhat beyond what I would feel comfortable with in offering advice as I don't know your IT nor the network setups and that would be required knowledge as we might be able setup differnt folders, and workgroups with a master DB... hmm....
Jan 31 '13 #7
NeoPa
32,556 Recognized Expert Moderator MVP
It sounds to me like your question, for all its references to security etc, is really about filtering the data appropriately. I'm not saying ignore the security issues. Far from it. I just believe they are extraneous to this topic - once the question is better understood. I would go further. Like Z and Rabbit before him, I would advise strongly that you take note of this very important issue, but elsewhere than this thread.

As for filtering by a user, that depends entirely on how you plan to manage your user information. I suggest you get that sorted out first, as what you ask for depends heavily on the choices you make there.
Feb 1 '13 #8
zmbd
5,501 Recognized Expert Moderator Expert
In this case, I don't think this is a simple need to filter. If I had thought it were then I would have pointed the means of setting up a select query and pointed OP towards in the direction of basic database design.

However, in this case, All of us "Experts" know that it is very easy to open the navigation pane, even if hidden, how to bypass start-up code and the like; thus, because by its nature HIPAA class information requires a greater deal of care than Access can normally provide.

Some things that come to mind:


deployed to a kiosk for civilian drivers
Kiosks by their very nature are inherently insecure and usually in a fairly heavily accessed area; however, say this is a more restricted area... we still have an issue with the shift-key and other special keys - even if an autokeys macro is in place.
V2010 has some macros that can run even when the shift key is pressed and I am currently working on that aspect with my current project... maybe a way to trap this.

Now by splitting the database, and developing an Executable, we can prevent the creation of forms and queries, we still can not absolutly ensure that no means of direct access to the tables is available... this is not easily doable in the current version of Access (2007/2010). But we can make it more difficult.


Data is HIPPA Related and needs to be restricted to that individuals needs
There must be a highly reliable means of preventing access to this data. My thought is a second encrypted backend with the connection string stored as an encrypted value in a table. User could input their password, the connection established, relevant information queried and pulled, and the connection closed. Part of the logout process would be to re-enter their password as a means of "validating" any changes and the the connections re-established for syncing data.

employee so that they are limited in undoing data integrity.
As above.

government run
Dad is Ret.USAF; StpF. Ret.USN. - counting University, I spent 23 years of my life dealing with the Military; I have an idea of what you are up against. I also know what will happen if that data gets into the wrong person's hands. Hope you have a good legal defense fund.

Now, let's talk about that security thing again....
Feb 1 '13 #9
NeoPa
32,556 Recognized Expert Moderator MVP
I suppose it comes down to whether the question is about how to use Access to present the appropriate data to the user, or how to ensure that the data behind the scenes is inaccessible to everybody apart from that presented by the objects within the project. My own reading of the question leads me to believe the former is the case. It seems you believe the latter is. We'll have to see how it pans out (if ever it does).

Both are important and interesting questions, but they should not be together in a single thread if both are to be understood well, and have the effect they deserve. Each dilutes the other, which I don't believe benefits anyone.
Feb 1 '13 #10
zmbd
5,501 Recognized Expert Moderator Expert
With that I can agree!

I can also see how in this case, it may require some integration of the two parts. This will be a tough one.

jdoathout: I'll leave it to you to decide the course.
Feb 1 '13 #11
zmbd
5,501 Recognized Expert Moderator Expert
Sorry... couldn't wait, as I've got to get this thought down while the kids are in bed or I'll lose it in the midst of that thing called life :)

Now I'm sure that there's something I'm WAY over simplifying, and I know that I am way oversimplifying some things here, and I may even be just flat out wrong about this approach AND there's bound to be some sort of performance hit with this method.

I expect and Would like the other Experts to read and comment as this is just a "Proof of Concept," well, not even really a "Proof" at this stage; however, I lack a better word at this point.

However,
Here's something that just popped up in an old thread that I had read about years and years ago however, I'd forgotten it was even a possibility until I saw it again: Link to an ACCESS query in another ACCESS database I had dismissed this as being useful for any reason whatsoever in V2003 and earlier. Maintaining queries in the front-end was easy enough and so was/is rolling forward updates. However, the method for getting at the queries along with this question... the old brain went... hmmmmmmm

Now I haven't tried this yet on anything of any size of significance; however, my thoughts are to build your main database and all of the queries and forms that you'll need. This should be the main administrative portion of the database.
Split the database into frontend and backend.
Now As forms can be based on queries, open a second database that we'll build to be the kiosk frontend.
Using the method above, "Remote Link" to the queries that will restrict your user's information that you've built in the administrative front end...
You can build a form that takes the user name and password, feed that to your remote queries and so forth.
You can build the reports in the kiosk frontend too.

Now what I did try just now is two separate databases. TestDB1 which will serve as the Kiosk frontend and TestDB2 - This will be our backend/admin.
Now I didn't split TestDB2 as I've suggested above as I'm only looking at POC

In TestDB2 I created a parameter based query (qry_1), and an open query (qry_2) on a very simple table of 26 made-up names and an autonumber field.

Then in my TestDB1 I used the method as given in the thread above to "remote link" to the queries TestDB2.Query1 and TestDB2.Query2. I also built two bound forms, one for each query. When ran, qry_1 prompted for the parameters... couldn't get it to look at the form; however, I didn't try too hard either as this is just POC. qry_2 ran as expected returning everything; however, within the form I could set the filters etc...

Main thing, is when I tried to get at the underlying tables, it wasn't quite easy to do... I knew the path; however, with a Kiosk the user shouldn't have rights to the file explorer. You can remove the Ribbon, QAT, and close the navigation pane down so they wont have access to the queries; thus, making it very difficult to open the backend

I'm thinking that using this method along with the links to secure the database as given before, would make things much more difficult for your end-users to muck about... even making the frontend a ACCDE file after design using this method would keep the user from modifying anything...

Just a thought for the security side.
- The networking side will still need to be addressed by your IT department. That is well beyond the scope of this forum.
- SQL would be for a different thread me thinks.
Feb 2 '13 #12

Sign in to post your reply or Sign up for a free account.

Similar topics

6
5487
by: PMBragg | last post by:
Thank you in advance for any and all assistance. Is there a way to hide the Main Access window with tables, queries, forms etc programmatically? Michael
1
1078
by: Lumpierbritches | last post by:
Thank you in advance. Is there a way to update Runtime Versions of Access 97, with just the Queries, Forms, Macros, and Modules, leaving the tables in tact? Is there a bit of code to do this, or...
2
3961
by: Max | last post by:
I am editting a database created in access 2003 by another programmer. This person has left the company for which the database was created and no documentation. So that I could work on this...
1
1579
by: jdurell | last post by:
I am trying to work with a copy of an access database but I cannot seem to access the forms/reports or code. I am holding shift to go in the back door The queries and tables are there but thats...
0
1027
by: wojtek | last post by:
Hello, I have a task to create set of reports based on data from TFS source control. I must create these reports using reporting services technology.
0
1148
by: josur | last post by:
Hi, I would like to know if is possible to create dynamic reports based on cubes. What i mean is,after creating a cube with a couple of dimensions and measure if is there any way to give the...
37
1688
beacon
by: beacon | last post by:
Can you use queries in reports? I'm trying to enter a SQL statement in a text box on a report, but if I do it with an equal sign I get a syntax error. If I do it without an equal sign I get an...
1
1430
by: Donald Calloway | last post by:
I have written an application which includes 13 reports based on 39 individual queries. If a superuser happens to open any of these queries and performs filtering of a dataset to satisfy a...
1
2079
by: titli | last post by:
Hi All, Please tell me the best solution to implemenet security in access databases , to save the tables, queries, forms , reports as well as the VBA code from user access. The users of the...
1
1308
by: Milan Grba | last post by:
Can anyone tell me what the load impact on the network when running desktop queries vs. server based queries. I am not sure this is the exact question i want to ask or if i asked it in the right way....
0
7106
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
6967
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
7137
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
7181
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
1
6846
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
1
4874
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
3076
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
1
600
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
267
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.