473,396 Members | 2,093 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

is it possible to password protect a sql query

6
Hello.

We know it's possible to protect VBA code with passwords. Is there something analog to protect a sql source code so users can run it but can't see the actual sql?

thanks.
Sep 7 '15 #1

✓ answered by jforbes

There is no way in Access alone to lock down the database's data that can't be undone. Access isn't secured and it isn't designed to be secured.

The only security you have available in Access alone is file based security where you can put the data on a File Share and then maintain which users have read/write access to the File Share. Taking that a step further, you can split your Access databases up by security levels and place the different databases on separate File Shares so that you can have one front end, but different levels of data access based on the users permissions. This is a lot of work, but it will work.

In the file based security model, if the user has access to part of a table, they have access to all of the table. This still may not be desirable and if you need to lock this down further, you'll need to hide the database from the user altogether. One way to do this is to put it on a Webserver and create web services to retrieve your data so that the user never directly queries the database. That's a deep subject that people have written books on.

2 2679
jforbes
1,107 Expert 1GB
There is no way in Access alone to lock down the database's data that can't be undone. Access isn't secured and it isn't designed to be secured.

The only security you have available in Access alone is file based security where you can put the data on a File Share and then maintain which users have read/write access to the File Share. Taking that a step further, you can split your Access databases up by security levels and place the different databases on separate File Shares so that you can have one front end, but different levels of data access based on the users permissions. This is a lot of work, but it will work.

In the file based security model, if the user has access to part of a table, they have access to all of the table. This still may not be desirable and if you need to lock this down further, you'll need to hide the database from the user altogether. One way to do this is to put it on a Webserver and create web services to retrieve your data so that the user never directly queries the database. That's a deep subject that people have written books on.
Sep 9 '15 #2
zeta
6
mmm... i think i will just try to invoke the query from vba.

thanks for the answer.
Sep 9 '15 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: Narlen | last post by:
Hi there, I don't know much about web design but I proudly managed to password protect a page on my site. Later I realized that everyone looking at the source in any web browser can see the...
5
by: Brent Burkart | last post by:
I want to protect my website with a user and password. I have SQL Server 2000 where I want to store the users and passwords and the website is complete. I just need to add in some security with...
4
by: sunniyeow | last post by:
Hi, My question is regarding password protecting 2 different folders inside a single virtual directory using forms authentication method. Easier if I illustrate things out... - <authentication...
5
by: Trev | last post by:
Hey, I have a complete frontend setup, the first window/form that shows up gives you an option of 3 databases. One of them will only need to be accessed by about 2 - 3 people within our...
3
by: Miro | last post by:
Why Password protect an MDB when someone can google and get a hack? Wondering if anyone else has thought of this and just said "oh well"... I plan to password protect an MDB where I have some...
12
by: =?Utf-8?B?am9uaWdy?= | last post by:
I wrote a simple VB.NET application that imports and edits CSV files. Now I’d like to “lock” the raw (pre-import) CSV files so these cannot be opened separately. It is not high-sensitive...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
5
by: rgsw | last post by:
Hi - I would like user to open Access database and have a choice to either enter a password or click on a button that opens the database in 'read only'. I know this is possible with Excel, but I...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.