473,396 Members | 1,997 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

how to protect a user update from accessing other users ids

229 100+
Hi,
I wonder if someone could point me to what it is I might need.

I am attempting to give users the ability to update their records in an access database. The records have ids.

What is to stop them from changing the id in the address bar and to view and update someone elses record from the control panel?

I am entirely new to this and just see the potential problem. Ids are not too unique.

Thanks
Richard
Mar 5 '08 #1
2 1054
jhardman
3,406 Expert 2GB
Hi,
I wonder if someone could point me to what it is I might need.

I am attempting to give users the ability to update their records in an access database. The records have ids.

What is to stop them from changing the id in the address bar and to view and update someone elses record from the control panel?

I am entirely new to this and just see the potential problem. Ids are not too unique.

Thanks
Richard
When someone first logs in, set a session variable that is their ID number:
Expand|Select|Wrap|Line Numbers
  1. session("userID") = ID
Then when they go to update, check that the numbers match:
Expand|Select|Wrap|Line Numbers
  1. if session("userID") = objRS("ID") then
  2.    'OK to update
  3. else
  4.    response.write "Hey, this is the wrong record!"
  5. end if
Mar 6 '08 #2
fran7
229 100+
Thanks, Thats great.
Richard
Mar 7 '08 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

5
by: Brent Burkart | last post by:
I want to protect my website with a user and password. I have SQL Server 2000 where I want to store the users and passwords and the website is complete. I just need to add in some security with...
1
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
0
by: Shawn Milochik | last post by:
This isn't really a Python question -- it's a Web development question. The easy answer is to just password protect the directory all the pages are stored in, and require a password. This can be...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.